added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T21:33:18.686185+00:00
1,581,290,290,000
9688b662243c2f6b6d8e2ce7d077930436536bbd
3
{ "blob_id": "9688b662243c2f6b6d8e2ce7d077930436536bbd", "branch_name": "refs/heads/master", "committer_date": 1581290290000, "content_id": "cdf55acd2ff40d40bf4511ff0df11042b4e63749", "detected_licenses": [ "MIT" ], "directory_id": "bc1a55b070373c6e59e7115f62a14d3bd7829225", "extension": "py", "fi...
2.734375
stackv2
import re import io from lark import Lark from .jass_mapping import JassScriptTransformer """ Formats: j This is a plain text parser for creating an AST out of JASS code, NOT a binary format parser. It is based on Lark instead of construct. The grammar is in Lark's EBNF-like syntax and is pretty self-explana...
267
24.9
166
19
2,013
python
[{"finding_id": "codeql_py/redos_b3b33fbcccedd85f_7304464f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\\\'." ]
[ 230 ]
[ null ]
[ 26 ]
[ 42 ]
2024-11-18T21:55:40.548916+00:00
1,612,376,236,000
eca4c04d7b00285c9db0ea5a7300e29bce833768
2
{ "blob_id": "eca4c04d7b00285c9db0ea5a7300e29bce833768", "branch_name": "refs/heads/master", "committer_date": 1612376236000, "content_id": "4775328b56b101c58d8f4e4f2f9f3d0f4a4a17df", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a3385f7636ceb232e97ae30badee0ba9145138f8", "extension": "py"...
2.375
stackv2
#!/usr/bin/env python ''' # Copyright 2013-2014 Mirsk Digital ApS (Author: Andreas Kirkedal) # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. ...
173
35.74
118
18
1,293
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_877b7cb9ac54bcf3_a5806a61", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 123 ]
[ null ]
[ 20 ]
[ 46 ]
2024-11-18T21:55:41.636233+00:00
1,614,925,344,000
16bcc8df847b47969f9db73dec42ef34ab47ab0e
3
{ "blob_id": "16bcc8df847b47969f9db73dec42ef34ab47ab0e", "branch_name": "refs/heads/master", "committer_date": 1614925344000, "content_id": "7128b7961e54348e83c8334de3290252d9b841e0", "detected_licenses": [ "MIT" ], "directory_id": "74d1ea06f83470841173dd8014bbdecd54ebc8ec", "extension": "py", "fi...
3.0625
stackv2
try: import requests import urllib3 from fake_headers import Headers from .chapter_list import Chapter_list from bs4 import BeautifulSoup import re import os import time import random except Exception as ex: print(ex) class Chapter_reader(Chapter_list): def __init__(self,ma...
143
41.06
109
20
1,221
python
[{"finding_id": "codeql_py/request-without-cert-validation_e42a89bbe8508135_ac9baf07", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 32, 88 ]
[ null, null ]
[ 20, 20 ]
[ 94, 83 ]
2024-11-18T21:56:04.454253+00:00
1,574,242,725,000
46d96ee44dc44a2f396fb769f9857a0bbd231dad
3
{ "blob_id": "46d96ee44dc44a2f396fb769f9857a0bbd231dad", "branch_name": "refs/heads/master", "committer_date": 1574242725000, "content_id": "91ae8b3670c7fba072ecdf8b3db69bed3296635e", "detected_licenses": [ "BSD-3-Clause", "MIT", "Apache-2.0" ], "directory_id": "8b4f09f5a27a77cdf3894756e04566e...
2.734375
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- from jinja2 import Environment, FileSystemLoader from util import resource_path class Renderer: def __init__(self, path='./', temp_path='preview/template.html', css_path='preview/template.css', lang='en'): self.lang = lang self.env = Environment(loader=Fil...
79
34.53
113
16
637
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fb2438ef48a8018f_d1217fe4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 10 ]
[ null ]
[ 20 ]
[ 79 ]
2024-11-18T20:57:00.399283+00:00
1,581,099,363,000
be7a730feec27f239d71a8b61bec3cf55a29b066
2
{ "blob_id": "be7a730feec27f239d71a8b61bec3cf55a29b066", "branch_name": "refs/heads/master", "committer_date": 1581099363000, "content_id": "41848308f5d8cf2f140466b5e72efa7ef723eadf", "detected_licenses": [ "MIT" ], "directory_id": "f87d3c29736cb7249409ad3f6584981a16cf7210", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python # encoding: utf-8 import requests import sys import json session = requests.Session() def login(domain, username, password): global session url = domain + "/components/user/controller.php?action=authenticate" data = { "username": username, "password": password, ...
160
36.21
149
13
1,595
python
[{"finding_id": "codeql_py/request-without-cert-validation_200b51ae5f44aa59_24b40209", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 20, 30, 79, 88, 97 ]
[ null, null, null, null, null ]
[ 16, 16, 20, 20, 20 ]
[ 58, 46, 82, 82, 82 ]
2024-11-18T22:17:35.815312+00:00
1,594,825,602,000
b4db684afa526430a14614f47d83eb2458645d32
2
{ "blob_id": "b4db684afa526430a14614f47d83eb2458645d32", "branch_name": "refs/heads/master", "committer_date": 1594825602000, "content_id": "cc563122e5ab6111378ade717449d80825eb2fed", "detected_licenses": [ "MIT" ], "directory_id": "1aacf84f6c8106f04ea03da0a790bce33b22f8b2", "extension": "py", "fi...
2.3125
stackv2
import requests import json def get_access_token(token=False): if token is False: url = "https://fmcrestapisandbox.cisco.com/api/fmc_platform/v1/auth/generatetoken" request = requests.session() request.auth = ('jamearl', 'e66Z7VGQ') request.headers = { "Content-Type": "...
27
23.78
90
11
155
python
[{"finding_id": "codeql_py/request-without-cert-validation_05e9412b491930bb_0c8dee44", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 14 ]
[ null ]
[ 20 ]
[ 51 ]
2024-11-18T22:44:13.600413+00:00
1,681,301,224,000
76479f607dfed4bae4084af062367da0db6e972a
3
{ "blob_id": "76479f607dfed4bae4084af062367da0db6e972a", "branch_name": "refs/heads/master", "committer_date": 1681301224000, "content_id": "9f4a50b05118c83876ee08ce509ed6ba76969ac5", "detected_licenses": [ "MIT" ], "directory_id": "26a087e1043d1d0aaee105ea371762263b967d22", "extension": "py", "fi...
2.875
stackv2
import re from .errors import EmailError # 手机号正则表达式 _REGEX_PHONE = re.compile(r"1\d{10}") _GEN_DELIMS_REGEX = re.compile(r"[\:\/\?\#\[\]\@]") _SUB_DELIMS_REGEX = re.compile(r"[\!\$\&\'\(\)\*\+\,\;\=]") def is_phone(phone: str = None) -> bool: if not phone: return False return bool(_REGEX_PHONE.fullm...
69
27.84
110
12
610
python
[{"finding_id": "codeql_py/redos_857b807f98811abf_a665d2db", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'." ]
[ 39 ]
[ null ]
[ 14 ]
[ 89 ]
2024-11-18T22:44:13.808755+00:00
1,497,113,410,000
a022e343c6c03b38f0fb6885b2c81241070991bd
3
{ "blob_id": "a022e343c6c03b38f0fb6885b2c81241070991bd", "branch_name": "refs/heads/master", "committer_date": 1497113410000, "content_id": "2be6ad4a34d8b92b9da3103da05ec92f8dac5f70", "detected_licenses": [ "Apache-2.0" ], "directory_id": "480cb7b9eaaeec89ce026f4723f0d59bd7c29766", "extension": "py"...
3.03125
stackv2
import re from common import get_job_type_from_position_info_xlsx, set_show_Chinese from read_position_info import get_salary_list import numpy as np import matplotlib.pyplot as plt from matplotlib.ticker import MultipleLocator, FormatStrFormatter set_show_Chinese() def calculate_average_salary(xlsx_file): sala...
95
32.76
116
12
960
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_73c67c6c1a9ed25b_60c4c81f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 51 ]
[ null ]
[ 12 ]
[ 54 ]
2024-11-18T23:10:48.881045+00:00
1,528,124,827,000
594d4d0dea751b699b9ab0d0888744eb1282d136
2
{ "blob_id": "594d4d0dea751b699b9ab0d0888744eb1282d136", "branch_name": "refs/heads/master", "committer_date": 1528124827000, "content_id": "2422fcce69423290149fe05f8e82f124c8c8656c", "detected_licenses": [ "MIT" ], "directory_id": "be071e6027a118240523b0730e9464a4bed3c706", "extension": "py", "fi...
2.5
stackv2
import orm_mfk from sqlalchemy.orm import sessionmaker Session = sessionmaker(bind=orm_mfk.engine) session = Session() addr1 = orm_mfk.Address(street="adsfad") addr2 = orm_mfk.Address(street="123") addr3 = orm_mfk.Address(street="2321asd") c1 = orm_mfk.Customer(name="jack", billing_address = addr1, shiping_address=...
19
31
83
11
176
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31e979744c6b56fc_ad0e1342", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 18 ]
[ null ]
[ 17 ]
[ 36 ]
2024-11-18T23:10:51.215913+00:00
1,685,740,149,000
2abd392608ad4b777ca7e352be054ab76c858e02
3
{ "blob_id": "2abd392608ad4b777ca7e352be054ab76c858e02", "branch_name": "refs/heads/master", "committer_date": 1685740149000, "content_id": "5727ee2f1e05893c4b7b264696d54bf73018d344", "detected_licenses": [ "MIT" ], "directory_id": "a08f5ab93802c46ae653ca8e347aadfd9aed6f7c", "extension": "py", "fi...
3.046875
stackv2
import json import requests import urllib3 from bs4 import BeautifulSoup from requests_kerberos import OPTIONAL, HTTPKerberosAuth from colorama import Fore, Style COLOR_GREEN = Style.BRIGHT + Fore.GREEN COLOR_RED = Style.BRIGHT + Fore.RED def get_valid_sites(folder): """ Create sites.json in folder with v...
75
36.2
119
16
714
python
[{"finding_id": "codeql_py/request-without-cert-validation_0331b8720895680f_86677cb2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 30 ]
[ 34 ]
[ 20 ]
[ 82 ]
2024-11-18T22:29:32.722211+00:00
1,615,985,124,000
ce6973f78ba116c10ccdebd24021f237febfc777
2
{ "blob_id": "ce6973f78ba116c10ccdebd24021f237febfc777", "branch_name": "refs/heads/master", "committer_date": 1615985124000, "content_id": "cce40a669fc1977d58be46e8e67ceaed30f7f351", "detected_licenses": [ "MIT" ], "directory_id": "29f9d12964c8e0625678ab338af76a6cde2bc8fd", "extension": "py", "fi...
2.421875
stackv2
import pymongo import os from dotenv import load_dotenv # from datetime import datetime load_dotenv() DB_USER = os.getenv("MONGO_USER", default="OOPS") DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="OOPS") CLUSTER_NAME = os.getenv("MONGO_CLUSTER_NAME", default="OOPS") connection_uri = f"mongodb+srv://{DB_USER}:{...
22
31.95
117
8
172
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_408625989908c429_59e8de72", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 14 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-18T22:29:36.438299+00:00
1,497,293,759,000
87fa912d3dda48b0ef90e292197d5e726e508991
2
{ "blob_id": "87fa912d3dda48b0ef90e292197d5e726e508991", "branch_name": "refs/heads/master", "committer_date": 1497293759000, "content_id": "5812ec345c25d8c6170f3c7b740f25e79c2d8fea", "detected_licenses": [ "Apache-2.0" ], "directory_id": "02c6f2ff675fb681d26c75c59624cac93bb14b53", "extension": "py"...
2.453125
stackv2
# Copyright 2017 The TensorFlow Authors All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicab...
198
37.95
80
17
1,866
python
[{"finding_id": "codeql_py/tarslip_5d6c08536ae4ba92_45be6c76", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 61 ]
[ null ]
[ 5 ]
[ 35 ]
2024-11-18T22:29:46.135325+00:00
1,594,395,569,000
6ca99ffe40b99afbfb702a1d2059f95d0792ba87
2
{ "blob_id": "6ca99ffe40b99afbfb702a1d2059f95d0792ba87", "branch_name": "refs/heads/master", "committer_date": 1594395569000, "content_id": "8041b8dd678c1995e9638622e89960e324635527", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5e1ca3c8eb770c40c58ee7a92691195351c31c23", "extension": "py"...
2.375
stackv2
#pylint: disable=bare-except """ Abstraction of the data handler. For test purposes, we can store data locally. With a production system, we are likely to set the data to a remote server. """ from __future__ import absolute_import, division, print_function, unicode_literals import sys import logging import json...
228
37.91
150
17
1,984
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_97fd7700253a4471_8a712037", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 31 ]
[ null ]
[ 21 ]
[ 72 ]
2024-11-18T22:29:51.872320+00:00
1,606,322,016,000
42f46b39a8da44a13007a14bbe6d097d57f0556a
3
{ "blob_id": "42f46b39a8da44a13007a14bbe6d097d57f0556a", "branch_name": "refs/heads/main", "committer_date": 1606322016000, "content_id": "6e289cc215b81218c1c45c60997152fc10539ebd", "detected_licenses": [ "MIT" ], "directory_id": "3d83f61a832cac160cee2708e60f9f8e139f4b2f", "extension": "py", "file...
2.828125
stackv2
from flask import Flask, request, abort, jsonify app = Flask(__name__, static_url_path='', static_folder='staticpages') books = [ {"id": 1, "Title": "Harry Potter", "Author": "JK", "Price": 1000}, {"id": 2, "Title": "some cook book", "Author": "Mr Angry Man", "Price": 2000}, {"id": 3, "Title": "Python made ...
58
24.33
108
15
432
python
[{"finding_id": "codeql_py/flask-debug_8f936a469c46265e_202eeceb", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 58, 42, 48, 54 ]
[ null, null, null, null ]
[ 5, 12, 12, 12 ]
[ 24, 16, 49, 49 ]
2024-11-18T21:33:30.318353+00:00
1,614,579,126,000
a058753cabb729b06d53b7eff9aa2ffa43dffbbc
3
{ "blob_id": "a058753cabb729b06d53b7eff9aa2ffa43dffbbc", "branch_name": "refs/heads/main", "committer_date": 1614579126000, "content_id": "9a2036e86f91923ab51aba6c2a1f0b8d65c85de1", "detected_licenses": [ "MIT" ], "directory_id": "7485d8efbe16a51f13652a9aacefc19a68ebedd1", "extension": "py", "file...
2.671875
stackv2
import requests import json import tkinter as tk import qrcode import os url = 'http://passport.bilibili.com/qrcode/getLoginUrl' url2= 'http://passport.bilibili.com/qrcode/getLoginInfo' #link = input('输入哔哩哔哩url') #link = str(link) # json 转get url得参数 def jsonDataToUrlParams(params_data): url_str = '' nums = 0 ...
81
26.68
99
17
701
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4f8cc437d5357def_a7dc5065", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 35 ]
[ null ]
[ 7 ]
[ 33 ]
2024-11-18T21:33:34.251460+00:00
1,562,910,749,000
929be721404f6830b3c8d52d666f1a317ce2c934
2
{ "blob_id": "929be721404f6830b3c8d52d666f1a317ce2c934", "branch_name": "refs/heads/master", "committer_date": 1562910749000, "content_id": "b0c2c1793ae1d549483cc1835b33bbf7934d2977", "detected_licenses": [ "MIT" ], "directory_id": "0eb397c7843583457c7219a2a503053d41a22e78", "extension": "py", "fi...
2.4375
stackv2
# -*- coding: utf-8 -*- import base64 import hmac import json import urllib.parse from collections import OrderedDict from hashlib import sha1 import requests import time from . import generate_nonce, dict2qs, qs2dict try: from urllib import urlencode, quote except ImportError: from urllib.parse import urlen...
249
36.49
120
19
2,020
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_91e95aa25848209b_e3bb7a89", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-295", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 169, 150, 152 ]
[ null, null, null ]
[ 15, 21, 21 ]
[ 27, 110, 109 ]
2024-11-18T23:15:48.583178+00:00
1,600,746,287,000
aca1ac6980e8b8e9a041ca5fd3fd4c5b217fc5b0
3
{ "blob_id": "aca1ac6980e8b8e9a041ca5fd3fd4c5b217fc5b0", "branch_name": "refs/heads/master", "committer_date": 1600746287000, "content_id": "5bd66b2970a9e1a80823a13d7abde7caa2cd6f9f", "detected_licenses": [ "MIT" ], "directory_id": "3df4ca16bca9621a7e3c9d36fe8c762026b5491e", "extension": "py", "fi...
3.125
stackv2
from flask import Flask, render_template, request, send_file app = Flask(__name__) @app.route('/') def index(): """ Function to render index.html when a request is made to "/". """ return render_template('index.html', title='Connect Your Neurons') @app.route('/get_keras_model', methods=['POST']) de...
182
27.85
99
15
1,117
python
[{"finding_id": "codeql_py/code-injection_6d9ebb46c5bc246f_619116ab", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 22 ]
[ null ]
[ 40 ]
[ 49 ]
2024-11-18T22:30:15.179207+00:00
1,541,671,468,000
e4cc987476aa6b75fd1e0fe7ac1c6f4334349ef8
2
{ "blob_id": "e4cc987476aa6b75fd1e0fe7ac1c6f4334349ef8", "branch_name": "refs/heads/master", "committer_date": 1541671468000, "content_id": "53ba45173409137767ffc6d9906ff3d1e550f02d", "detected_licenses": [ "MIT" ], "directory_id": "8b1b1a9d8ed82d9fca94a6b311b57c9b5a736f91", "extension": "py", "fi...
2.40625
stackv2
import glob, json import hashlib from ethereum.utils import privtoaddr, checksum_encode address = {} dicts = glob.glob('./dicts/*.txt') passwords = set() for d in dicts: with open(d, 'r') as f: data = f.read().strip().split('\n') for d in data: passwords.add(d.strip()) for p in passwords: pk = hashlib.sha25...
37
24.27
54
14
303
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_10a3fb6fcf9cc05a_35a7fadc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 18, 24, 31 ]
[ null, null, null ]
[ 22, 22, 19 ]
[ 32, 32, 29 ]
2024-11-18T22:30:25.759904+00:00
1,691,066,984,000
1a1a0926b5fd7fc8faaf0c3edeb31f33611091e1
2
{ "blob_id": "1a1a0926b5fd7fc8faaf0c3edeb31f33611091e1", "branch_name": "refs/heads/master", "committer_date": 1691072219000, "content_id": "a5b76129cb52de9c711b0f1a01cb0e773f830232", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "30f01434a60aecb8e01d1544f2ac697198d3d403", "extension": "p...
2.375
stackv2
import os import errno import shlex import random import socket import tempfile import yaml import time import shutil import subprocess def check_port(port, rais=True): try: sock = socket.create_connection(("localhost", port)) except socket.error: return True if rais: raise Runtime...
272
29.56
114
18
1,894
python
[{"finding_id": "codeql_py/overly-permissive-file_773b4feaf6c1b1ac_f8302c15", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 248 ]
[ null ]
[ 13 ]
[ 45 ]
2024-11-18T22:44:42.930104+00:00
1,537,954,144,000
fd61bdb3f2db97b8633f00ffe7d5f74f43826c94
2
{ "blob_id": "fd61bdb3f2db97b8633f00ffe7d5f74f43826c94", "branch_name": "refs/heads/master", "committer_date": 1537954144000, "content_id": "8810876a222e4cbfff168be0aa4ae20a5aadb188", "detected_licenses": [ "MIT" ], "directory_id": "5dfa7d688bec2ad6bac08343584e94101474369d", "extension": "py", "fi...
2.4375
stackv2
# !/usr/bin/python # -*- coding: utf-8 -*- """ Created by andresilva on 2/19/16""" from flask import redirect, render_template, request, url_for, Blueprint from flask_login import (login_user, login_required, logout_user, current_user) from flask_bcrypt import check_password_hash import proje...
56
33.8
79
19
406
python
[{"finding_id": "codeql_py/url-redirection_b1f05a560ad987c2_45dea41e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 31, 45 ]
[ null, null ]
[ 25, 33 ]
[ 70, 78 ]
2024-11-18T23:36:47.051233+00:00
1,659,540,632,000
0c4300ecab7bc3039a69575c8bbba7c171b84647
2
{ "blob_id": "0c4300ecab7bc3039a69575c8bbba7c171b84647", "branch_name": "refs/heads/master", "committer_date": 1659540632000, "content_id": "7819fd6e9b1cf68e3f534ae7c04a207700428a48", "detected_licenses": [ "Apache-2.0" ], "directory_id": "76737a79d8b27685d3b54523ddba237156deb348", "extension": "py"...
2.328125
stackv2
import json from django.conf import settings from django.http import JsonResponse from rest_framework.decorators import api_view from rest_framework.views import APIView from rest_framework.response import Response from rest_framework import status from docs.version import __version__ from my_api.context_processors i...
130
31.06
88
15
962
python
[{"finding_id": "codeql_py/path-injection_25ba074ec36083e6_26a9e59b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 74 ]
[ null ]
[ 19 ]
[ 63 ]
2024-11-18T23:36:48.024066+00:00
1,520,609,332,000
b37dd3fa0ecef2e38a055b9694501073e50a303f
4
{ "blob_id": "b37dd3fa0ecef2e38a055b9694501073e50a303f", "branch_name": "refs/heads/master", "committer_date": 1520609332000, "content_id": "ab169c8cfdc2ccc9244dce650f40ac2e12e21337", "detected_licenses": [ "MIT" ], "directory_id": "1a3cd8b3fabf855ddf5986c7d3ce627075210afd", "extension": "py", "fi...
3.65625
stackv2
# -*- coding: utf-8 -*- """Main module.""" import sys import re import urllib.request import time class LED_Grid(): '''Class defined for the LED board''' def __init__ (self,L): self.grid = [[False]*L for _ in range(L)] self.size=L # this function turns a rectangle of light, topleft LED to btm...
101
29.27
128
20
916
python
[{"finding_id": "codeql_py/overly-large-range_271370b4e50f5753_3f0b9504", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 47 ]
[ null ]
[ 57 ]
[ 60 ]
2024-11-18T21:14:09.325528+00:00
1,459,415,277,000
1d107819a5dce2b001550e8f0f0a4a99ea2af971
3
{ "blob_id": "1d107819a5dce2b001550e8f0f0a4a99ea2af971", "branch_name": "refs/heads/master", "committer_date": 1459415277000, "content_id": "48d506f1ddbd4fe5aaabbd0101fd31a547f64e69", "detected_licenses": [ "MIT" ], "directory_id": "18e0e96e187805994474e19b3a6f88bf03278cf4", "extension": "py", "fi...
2.59375
stackv2
from rest_framework import serializers from voluptuous import Schema, MultipleInvalid, Invalid class SchemaValidator: """ see also: - https://github.com/alecthomas/voluptuous - http://www.django-rest-framework.org/api-guide/validators/#writing-custom-validators """ def __init__(self, *args,...
19
32.05
92
14
134
python
[{"finding_id": "codeql_py/stack-trace-exposure_b89e3a1a61534c77_c58fcc09", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 17, 19 ]
[ null, null ]
[ 47, 47 ]
[ 53, 53 ]
2024-11-18T21:14:13.657719+00:00
1,632,257,371,000
de7d90c46bff2addda4296b77754dda89ffec857
3
{ "blob_id": "de7d90c46bff2addda4296b77754dda89ffec857", "branch_name": "refs/heads/main", "committer_date": 1632257371000, "content_id": "99502fd9f17ee657ec2beb7361ba0435e27032b6", "detected_licenses": [ "MIT" ], "directory_id": "ceb759ad940a4257793de8c6223036b16761d5c8", "extension": "py", "file...
2.984375
stackv2
import calendar import locale import webbrowser import argparse from typing import Dict, Iterable from datetime import datetime, date, timedelta from dateutil.relativedelta import relativedelta from jinja2 import Template def get_next_sunday_date(input_date: date) -> date: """ Returns the date of the next sund...
128
35.02
138
14
1,127
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e97ee122e758b321_f611a3fc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 94 ]
[ null ]
[ 9 ]
[ 31 ]
2024-11-18T21:57:27.249419+00:00
1,557,057,226,000
1a9d9eef1784c6c4f7b57a38906f3ee7c2e2e121
3
{ "blob_id": "1a9d9eef1784c6c4f7b57a38906f3ee7c2e2e121", "branch_name": "refs/heads/master", "committer_date": 1557057226000, "content_id": "ce7795e24b91f364688b6eb4677697a48242e6a5", "detected_licenses": [], "directory_id": "45de13a618813455a3ea1e65c5dd31066b311cd7", "extension": "py", "filename": "htm...
2.75
stackv2
# #-*- coding: utf-8-*- # # Source:https://github.com/Show-Me-the-Code/show-me-the-code # # Author:Burness Duan # # Date:2014-12-28 # # Python 2.7 from HTMLParser import HTMLParser from re import sub from sys import stderr from traceback import print_exc import urllib2 class _DeHTMLParser(HTMLParser): def __ini...
58
24.72
64
15
422
python
[{"finding_id": "codeql_py/bad-tag-filter_daab8e7cfae8f9f0_a6925f8a", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match upper case <SCRIPT> tags." ]
[ 55 ]
[ null ]
[ 22 ]
[ 44 ]
2024-11-18T21:57:28.879141+00:00
1,632,880,075,000
146f91548ba2671e45dd99414d547031e8668d69
3
{ "blob_id": "146f91548ba2671e45dd99414d547031e8668d69", "branch_name": "refs/heads/master", "committer_date": 1632880075000, "content_id": "701aca7ea2b8c86e93b641bbee0bb1d86cb5559f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "388750f05c5a1c8f26ae38a29587f8be9569b9c1", "extension": "py"...
2.6875
stackv2
#!/usr/bin/env python import jinja2 import os import sys import yaml TEMPLATES_DIRECTORY = "src/deployment_templates" DEPLOYMENTS_DIRECTORY = "deployments" def usage(): print "Converts single user data file into a current" print "deployment configuration under the %s/ directory." % ( DEPLOYMENTS_DIR...
82
28.34
90
12
517
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_031b425296bf286e_ebf06005", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 58 ]
[ 60 ]
[ 16 ]
[ 65 ]
2024-11-18T21:57:50.624658+00:00
1,407,586,396,000
45f29c014fa0acf9ff09dd3a5b2d40e9ea049d52
2
{ "blob_id": "45f29c014fa0acf9ff09dd3a5b2d40e9ea049d52", "branch_name": "refs/heads/master", "committer_date": 1407586396000, "content_id": "ce9f9004187ad9453e5c3457b4f6fb4e6ef92e47", "detected_licenses": [ "MIT" ], "directory_id": "8e438847008fac75878d3e8e34ba7ae10178ec40", "extension": "py", "fi...
2.421875
stackv2
# -*- coding: utf-8 -*- import requests from requests_oauthlib import OAuth1 from urlparse import parse_qs import logging log = logging.getLogger(__name__) from dgsauth.settings import USER_AGENT_STRING from dgsauth.settings import API_KEY from dgsauth.settings import API_SECRET from dgsauth.settings import API_ACCES...
179
31.37
125
15
1,225
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3edef54debed8e11_0b2232d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (sec...
[ 55, 56, 58, 81, 137 ]
[ null, null, null, null, 138 ]
[ 19, 19, 19, 22, 22 ]
[ 42, 48, 54, 84, 53 ]
2024-11-18T21:57:59.763635+00:00
1,594,772,042,000
dd7c699f2285ea30a1ae4362c57a53a4b47af5b6
3
{ "blob_id": "dd7c699f2285ea30a1ae4362c57a53a4b47af5b6", "branch_name": "refs/heads/master", "committer_date": 1594772042000, "content_id": "de1fc18ee141f11444bbba2be3d988b4c139cee5", "detected_licenses": [ "MIT" ], "directory_id": "4d86100281031513ea24cc98dcaf16183fb49671", "extension": "py", "fi...
2.984375
stackv2
#importing required libraries import jinja2 cancel = False device_list= [] #asking the user to enter the devices ips and credentials and creating a device list from user input while (True): name = input ("Enter the device name : ") ip_address = [str(i) for i in input("enter the device ip address ( e.g: 1.1....
55
34.07
147
13
513
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_af5792a543314197_8fa2cfc8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 50 ]
[ null ]
[ 16 ]
[ 41 ]
2024-11-18T21:58:26.169626+00:00
1,572,848,595,000
e0993028b25777ac6370413a6a69ace29d14c979
3
{ "blob_id": "e0993028b25777ac6370413a6a69ace29d14c979", "branch_name": "refs/heads/master", "committer_date": 1572848595000, "content_id": "fc0cb2a3a3fff05c33d4e01dbfafa7ef38092dc5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0941c0509a21bfda2a5e69eb05fe7f5436812b00", "extension": "py"...
3.4375
stackv2
# coding:utf-8 from flask import Flask,redirect, url_for from werkzeug.routing import BaseConverter app = Flask(__name__) # 这种语法叫做转换器(就是按照你指明的类型,把参数进行转换) # 127.0.0.1:5000/goods/123 # @app.route(r'/goods/<int:goods_id>') @app.route(r'/goods/<goods_id>') # 不加转换器类型,默认是普通的字符串规则(除了/的字符) # 比如这样子是访问不到的,http://192.168.205...
88
27.58
88
12
1,061
python
[{"finding_id": "codeql_py/flask-debug_e9aeacffd4346bf7_ebcd7410", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 88, 15, 69 ]
[ null, null, null ]
[ 5, 12, 12 ]
[ 59, 45, 37 ]
2024-11-18T21:58:37.337826+00:00
1,490,985,752,000
c330e9b26dc29a758b2cfaa87d125cd4117911ad
3
{ "blob_id": "c330e9b26dc29a758b2cfaa87d125cd4117911ad", "branch_name": "refs/heads/master", "committer_date": 1490985752000, "content_id": "27f940b166620f3a7cb4e0c7069c07ccc8b660ba", "detected_licenses": [ "MIT" ], "directory_id": "96e3dbb858f9615d7770406cc087d242c305189e", "extension": "py", "fi...
3.203125
stackv2
# Hashing import hashlib import hmac # Salting import string import random def create_salt(length=32): return ''.join(random.SystemRandom().choice(string.ascii_letters + string.digits) for _ in range(length)) def hash_it(password, salt=None, salt_it=True): if salt_it and not salt: salt = create_salt()...
20
27.4
109
14
140
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_8fc0ebfe60ab3d94_54986a1d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 15, 17 ]
[ null, null ]
[ 40, 31 ]
[ 53, 44 ]
2024-11-18T22:10:53.449138+00:00
1,621,796,792,000
b78bacfccb285261448c20bbde7a5864717b916a
3
{ "blob_id": "b78bacfccb285261448c20bbde7a5864717b916a", "branch_name": "refs/heads/master", "committer_date": 1621796792000, "content_id": "0ef882827475c43c4fb7503fa7f3db7b633e036c", "detected_licenses": [ "MIT" ], "directory_id": "b43990d0a4da55ecf5a1203f9eb5df9b875ff48f", "extension": "py", "fi...
2.59375
stackv2
__author__ = "kwhite" import calendar import datetime as dt import random import re import time from datetime import date from decimal import Decimal from math import ceil import pandas as pd from bs4 import BeautifulSoup from dateutil.parser import parse from functional import seq from selenium import webdriver from...
157
40.92
160
28
1,663
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e37d84fabbc2b089_ee29c76a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 116 ]
[ null ]
[ 16 ]
[ 32 ]
2024-11-18T23:10:58.896539+00:00
1,528,941,782,000
c97664501bd26cd02fc796ad861e7ab3d9a6afa0
2
{ "blob_id": "c97664501bd26cd02fc796ad861e7ab3d9a6afa0", "branch_name": "refs/heads/master", "committer_date": 1528941782000, "content_id": "d9c1043bd67fb7a3e5727a0b6d0a075fabc89e78", "detected_licenses": [ "MIT" ], "directory_id": "05d492f1a83c1f38cca6f51394119fcd8b9df64b", "extension": "py", "fi...
2.34375
stackv2
#coding:utf-8 #@auth:yunsle #@description:3cloud日志可视化平台 from pymongo import MongoClient from flask import * import json import datetime from bson import ObjectId # gevent from gevent import monkey from gevent.pywsgi import WSGIServer monkey.patch_all() #geoip import geoip2.database geo_reader = geoip2.database.Reader(...
104
23.57
68
18
683
python
[{"finding_id": "codeql_py/stack-trace-exposure_70e99800aea5bbb9_d6023944", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-117" ]
[ "py/stack-trace-exposure", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This log entry depends on a [user-provided value](1)." ]
[ 55, 51 ]
[ null, null ]
[ 16, 25 ]
[ 22, 29 ]
2024-11-18T23:10:59.390377+00:00
1,560,705,747,000
bff987113f4c0215978b24952e3ec7b764d6ba45
3
{ "blob_id": "bff987113f4c0215978b24952e3ec7b764d6ba45", "branch_name": "refs/heads/master", "committer_date": 1560705747000, "content_id": "6331315511e0e287e83f95346106d4ed98e218fd", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1e1aca2fb4e5114337bcc7b5aa27a22585bab191", "extension": "p...
2.65625
stackv2
# standard library import os import shutil from typing import Dict # third party import click from jinja2 import FileSystemLoader, Environment from rewardify.env import EnvironmentConfig from rewardify.main import Rewardify # local from rewardifycli.__internal.util import Singleton # ###################### # PRO...
285
28.76
119
15
1,973
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_55f11fe542510546_68224357", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-079" ]
[ "py/clear-text-storage-sensitive-data", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 245, 50 ]
[ null, null ]
[ 24, 28 ]
[ 31, 59 ]
2024-11-18T22:05:56.448124+00:00
1,552,232,808,000
25854fb40e0458e6ec8cd6db31dfce83093c0940
4
{ "blob_id": "25854fb40e0458e6ec8cd6db31dfce83093c0940", "branch_name": "refs/heads/master", "committer_date": 1552232808000, "content_id": "f13f1ae0295aba7aa55310fb08eba2eb3f01cef1", "detected_licenses": [ "MIT" ], "directory_id": "0fefd630aa4b500a1a218f5f12d351dfeb79d4a7", "extension": "py", "fi...
4.03125
stackv2
from abc import ABC, abstractmethod class Animal(ABC): def __init__(self, name=None, age=None, gender=None): self.name = name self.age = age self.gender = gender @abstractmethod def produce_sound(self): pass @property def name(self): return self.__name ...
108
19.9
60
13
570
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aec08dc7a8241ca5_67eba66b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 105 ]
[ null ]
[ 15 ]
[ 60 ]
2024-11-18T22:35:53.952615+00:00
1,487,544,095,000
6193e80e7adc60a11bab46f7490e1268971b3780
3
{ "blob_id": "6193e80e7adc60a11bab46f7490e1268971b3780", "branch_name": "refs/heads/master", "committer_date": 1487544095000, "content_id": "2290c26b89200b85b75ef920df32f8ab440d1710", "detected_licenses": [ "MIT" ], "directory_id": "81bcc901933fee719dab95145751d551b321a4a8", "extension": "py", "fi...
2.65625
stackv2
#! /usr/bin/env python from notebook.auth import passwd from notebook.auth.security import passwd_check from getpass import getpass try: import argparse argparse_imported = 1 except Exception: import sys argparse_imported = 0 def main(argv): if argparse_imported == 0: if len(argv) == 1: ...
74
32.73
117
14
573
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d61d9747fa232623_d1589bce", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 29, 31 ]
[ null, 38 ]
[ 43, 9 ]
[ 45, 99 ]
2024-11-18T22:35:56.265999+00:00
1,601,643,163,000
f005ec5ed2e02cb963274ab1822a8accbf347478
2
{ "blob_id": "f005ec5ed2e02cb963274ab1822a8accbf347478", "branch_name": "refs/heads/main", "committer_date": 1601643163000, "content_id": "266a1547509a5cb6d1a32e3e18797899db69474d", "detected_licenses": [ "MIT" ], "directory_id": "a6caffa62e5398c93b50cabbc3226e181e33ea19", "extension": "py", "file...
2.453125
stackv2
import asyncio import aiohttp import multidict import ujson class ApiOperations(object): def __init__(self): self.session = None self.default_header = multidict.CIMultiDict({}) self.loop = asyncio.get_event_loop() self.loop.run_until_complete(self.open_session()) async def op...
54
34.72
109
19
410
python
[{"finding_id": "codeql_py/request-without-cert-validation_c6fd50e001e8db9b_c0ebf0ec", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 20 ]
[ 84 ]
2024-11-18T22:49:02.239867+00:00
1,548,703,629,000
01d3934e84aabac3d4ffd344cd5e5370f8cb8c0e
3
{ "blob_id": "01d3934e84aabac3d4ffd344cd5e5370f8cb8c0e", "branch_name": "refs/heads/master", "committer_date": 1548703629000, "content_id": "77586a42965453780ff979cd999c6f9f8daff189", "detected_licenses": [ "MIT" ], "directory_id": "c42a0ec4205e6de011c1af366776f44a7d57cb21", "extension": "py", "fi...
2.71875
stackv2
import hashlib import hmac import os import requests import time from flask import abort, Flask, jsonify, request app = Flask(__name__) def is_request_valid(request): slack_signing_secret = os.environ['SLACK_SIGNING_SECRET'] timestamp = request.headers['X-Slack-Request-Timestamp'] slack_signature = req...
61
25.93
79
15
406
python
[{"finding_id": "codeql_py/partial-ssrf_54303dd6a2c1111a_5392ec6a", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 54 ]
[ null ]
[ 17 ]
[ 34 ]
2024-11-18T23:25:53.876960+00:00
1,439,911,824,000
c9fd2b5bbd125cfc28c69be334aeb543d92c6295
3
{ "blob_id": "c9fd2b5bbd125cfc28c69be334aeb543d92c6295", "branch_name": "refs/heads/master", "committer_date": 1439911824000, "content_id": "811a364ca6dec6a60dc26eb4e6189c0a9b126fe4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ebdad4901768dcf731fba882d3bbd32e4f117988", "extension": "py"...
2.5625
stackv2
#mitm.py # A demonstration of how http response cache documents can be # created in couchbase for later sync with mobile devices from flask import jsonify, request from flask import current_app from flask import g from . import blueprint from pprint import pprint from peewee import * import requests import hashlib imp...
106
28.24
96
21
752
python
[{"finding_id": "codeql_py/partial-ssrf_2e7a027d66c0b344_358fe4a0", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 61 ]
[ null ]
[ 14 ]
[ 42 ]
2024-11-18T23:26:03.449386+00:00
1,504,564,337,000
7f8cd3091c1984342bd373f81c9119c73c4fa5b1
2
{ "blob_id": "7f8cd3091c1984342bd373f81c9119c73c4fa5b1", "branch_name": "refs/heads/master", "committer_date": 1504564337000, "content_id": "aef182fab8665bcc6d60def9b2940910597fe52c", "detected_licenses": [ "MIT" ], "directory_id": "93026aabe241528299214f5eee565babdb41d786", "extension": "py", "fi...
2.484375
stackv2
import importlib, json, logging, os import gevent import GlobalStore from IrcMessage import IrcMessage class CommandHandler: commands = {} commandFunctions = {} apikeys = {} def __init__(self): self.logger = logging.getLogger("DideRobot") GlobalStore.commandhandler = self self.loadApiKeys() def loadAp...
185
40.04
157
21
1,754
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_89f0e96587652286_c2249021", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 33 ]
[ null ]
[ 18 ]
[ 68 ]
2024-11-18T23:26:04.864750+00:00
1,587,087,425,000
595b04fb3f785890448eb51d0a98b0335874a8ff
3
{ "blob_id": "595b04fb3f785890448eb51d0a98b0335874a8ff", "branch_name": "refs/heads/master", "committer_date": 1587087425000, "content_id": "b0a3dc09a57f5d4c3f562719cc7eba8281b71451", "detected_licenses": [ "MIT" ], "directory_id": "572634f525d7f46b17b3a266dabb1aa0d4e44834", "extension": "py", "fi...
2.828125
stackv2
import hashlib import json import requests import sys from time import time from uuid import uuid4 from flask import Flask, jsonify, request, render_template # Instantiate our Node app = Flask(__name__) # Generate a globally unique address for this node node_identifier = str(uuid4()).replace('-', '') # get the cur...
73
26.49
81
22
446
python
[{"finding_id": "codeql_py/reflective-xss_0d0441bd9c490531_b842925a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 67 ]
[ null ]
[ 12 ]
[ 30 ]
2024-11-18T22:27:36.097237+00:00
1,692,877,319,000
16dd4ea96c0515fb61df3797cce3662b412aedf9
3
{ "blob_id": "16dd4ea96c0515fb61df3797cce3662b412aedf9", "branch_name": "refs/heads/master", "committer_date": 1692877319000, "content_id": "70dc8c2a9ea8f58ddb89f485fa2712fd3c2057dd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2c7d0bb7332d4006b1d9c5768ee86e2838ebf3a2", "extension": "py"...
2.609375
stackv2
#!/usr/bin/env python3 """This script is used by the "complete" hook test, to act as a dummy job being started in a Deployment that belongs to a Krake Application. """ import os.path import requests endpoint_env = "KRAKE_COMPLETE_URL" token_env = "KRAKE_COMPLETE_TOKEN" default_ca_bundle = "/etc/krake_complete_cert/ca-...
46
31.3
87
12
367
python
[{"finding_id": "codeql_py/request-without-cert-validation_e706a355ca7c4acb_a2169fc1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 38 ]
[ 40 ]
[ 16 ]
[ 6 ]
2024-11-18T22:27:37.951201+00:00
1,608,905,859,000
6b04d29e9d1e81008f486ae561ce7b751b8966d8
3
{ "blob_id": "6b04d29e9d1e81008f486ae561ce7b751b8966d8", "branch_name": "refs/heads/main", "committer_date": 1608905859000, "content_id": "9d50bf2aa934518d82e3864d2f0eb0a3395dcde7", "detected_licenses": [ "MIT" ], "directory_id": "101a6b35c6603c1588d7ff95f8e81839fbedf618", "extension": "py", "file...
2.59375
stackv2
import paramiko import logging import os from dotenv import load_dotenv from telegram import Update, Bot from telegram.ext import Updater, CommandHandler, MessageHandler, Filters, CallbackContext load_dotenv() TELEGRAM_TOKEN = os.getenv('TELEGRAM_TOKEN') TELEGRAM_CHAT_ID = os.getenv('TELEGRAM_CHAT_ID') HOST = os.get...
83
29.96
90
15
585
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_97517d0807f12cd9_d7104453", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 25 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-18T22:27:43.166342+00:00
1,555,101,227,000
4d37bb0738800cda93eef202797d86cc71463720
2
{ "blob_id": "4d37bb0738800cda93eef202797d86cc71463720", "branch_name": "refs/heads/master", "committer_date": 1555101227000, "content_id": "ca157f32dabe630a5d2ef916ab85cbb5fde6d4f4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "99a1ed9a97d8a4df63105542fcd27be09f4f303e", "extension": "py"...
2.484375
stackv2
import logging from flask import Flask, request as req from app.controllers import pages from app.classes.database_container import DatabaseContainer from app.common_definitions.common_paths import PATH_TO_DATABASE from app.database import sqlite_script # Create and fill database with values - closes connection to ...
35
27.71
110
14
195
python
[{"finding_id": "codeql_py/log-injection_492e4d31d7d1c40f_0f670ab0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 30 ]
[ 31 ]
[ 25 ]
[ 49 ]
2024-11-18T22:39:21.962212+00:00
1,516,849,520,000
aa4689c97646c665a032778c5ef5a6e0c2fe43dc
2
{ "blob_id": "aa4689c97646c665a032778c5ef5a6e0c2fe43dc", "branch_name": "refs/heads/master", "committer_date": 1516849520000, "content_id": "5752bf31c4ffc93fcd898898821a36057656a4cd", "detected_licenses": [ "MIT" ], "directory_id": "c403249fe3b01c4c25e745dadc20ce96faf26dec", "extension": "py", "fi...
2.421875
stackv2
from flask import Flask from flask import render_template app = Flask(__name__) @app.route('/') def index(): return render_template('index.html') @app.route('/welcome') def sign_in(): return 'SIGN IN' @app.route('/who-are-you') def sign_up(): return 'SIGN UP' @app.route('/<username>') def user_profile(...
24
18.5
40
9
110
python
[{"finding_id": "codeql_py/reflective-xss_ffecd20b621f5ee1_85cb95d3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 20, 24 ]
[ null, null ]
[ 12, 12 ]
[ 37, 39 ]
2024-11-18T22:15:00.722503+00:00
1,601,482,381,000
20d04e0551a45bc03a40cf466428133f6550becb
3
{ "blob_id": "20d04e0551a45bc03a40cf466428133f6550becb", "branch_name": "refs/heads/master", "committer_date": 1601482381000, "content_id": "ad56bee52a2157fcd0bb37d4eab931a7860222fc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9456bfd645a151922bfde26aabb346a86ca0a3b3", "extension": "py"...
2.765625
stackv2
#!/usr/bin/env python3.5 # import requests library import requests #import json library import json # put the ip address or dns of your apic-em controller in this url #url = 'https://sandboxapic.cisco.com/api/v1/ticket' url='https://devnetapi.cisco.com/sandbox/apic_em/api/v1/ticket' #the username and password to ...
26
25.23
83
9
170
python
[{"finding_id": "codeql_py/request-without-cert-validation_52d6e42440cac90c_56dc130b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 23 ]
[ null ]
[ 11 ]
[ 84 ]
2024-11-18T22:55:37.871483+00:00
1,522,339,171,000
e3eeb59525d7afa2358933783bb81983803eec05
3
{ "blob_id": "e3eeb59525d7afa2358933783bb81983803eec05", "branch_name": "refs/heads/master", "committer_date": 1522339171000, "content_id": "d476a1127a1cee0191d6e89d05871332707a5cef", "detected_licenses": [ "MIT" ], "directory_id": "98a8503ea1ec98f8bb450d647c9517529e7f722d", "extension": "py", "fi...
2.640625
stackv2
'''' adapted from: http://flask.pocoo.org/docs/0.12/patterns/fileuploads/ ''' import os from flask import Flask, request, redirect, flash, url_for, send_from_directory, render_template from werkzeug.utils import secure_filename from flask.ext.mobility import Mobility from flask.ext.mobility.decorators import mobil...
54
31.3
96
16
363
python
[{"finding_id": "codeql_py/url-redirection_1cc0619d71dc2e78_337fa201", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 34, 40 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-18T22:55:40.456577+00:00
1,469,391,312,000
b88aa2821d931fb7dba4e6508ab87e39461dc690
3
{ "blob_id": "b88aa2821d931fb7dba4e6508ab87e39461dc690", "branch_name": "refs/heads/master", "committer_date": 1469391312000, "content_id": "448bd314b8c75794690113c407d24f2e36e5ddf5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0cae906ef33539a6963abd26a7f40a3cd835574f", "extension": "py"...
2.6875
stackv2
from __future__ import print_function import scipy.io as sio from shutil import copyfile import os import urllib import tarfile import numpy as np from collections import defaultdict from collections import namedtuple from PIL import Image import matplotlib.image as mpimg import random BoundingBox = namedtuple('Bound...
338
32.34
161
16
2,891
python
[{"finding_id": "codeql_py/tarslip_ead52c8aaabe1b2c_4acec280", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 39 ]
[ null ]
[ 9 ]
[ 10 ]
2024-11-18T23:55:44.370651+00:00
1,584,001,366,000
fbb52b55c951a33e93f9b3aed3aa66f0c563069e
3
{ "blob_id": "fbb52b55c951a33e93f9b3aed3aa66f0c563069e", "branch_name": "refs/heads/master", "committer_date": 1584001366000, "content_id": "8b37a5d70294b8101d23c67e4fd595858fd2e6bd", "detected_licenses": [ "MIT" ], "directory_id": "aeab5760b956fda37c515ac44138d4e0433ee65e", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python3 import logging import logmatic import os import sys from flask import Flask, request, jsonify, make_response from flask_sqlalchemy import SQLAlchemy from requestid import requestid, RequestIdFilter log_level = getattr(logging, os.environ.get('APP_LOG_LEVEL', 'INFO')) # Configure JSON filesyst...
128
27.6
76
14
899
python
[{"finding_id": "codeql_py/log-injection_6417b8bed8c94e3b_3087fdac", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
6
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends o...
[ 63, 66, 79, 92, 95, 109 ]
[ null, null, null, null, null, null ]
[ 25, 25, 21, 25, 25, 25 ]
[ 76, 57, 56, 73, 57, 57 ]
2024-11-18T22:56:19.315950+00:00
1,692,970,228,000
abc688b5ec92175521ac209997e2472bbd8e756f
3
{ "blob_id": "abc688b5ec92175521ac209997e2472bbd8e756f", "branch_name": "refs/heads/master", "committer_date": 1692970228000, "content_id": "a1511b92e88a3e20c3a1648c9269879179c59fe3", "detected_licenses": [ "MIT" ], "directory_id": "9468849850c7c2b2040835eb9496bfb716a98c21", "extension": "py", "fi...
2.8125
stackv2
""" doc_graphviz.py Creates the graphviz output used to visualize script dependencies. This file relies on the schemas.yml to create the graphviz plots. """ import os import cea.config import cea.schemas from jinja2 import Template __author__ = "Jack Hawthorne" __copyright__ = "Copyright 2018, Architecture and B...
138
37.21
118
17
1,249
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_37f8856735f06f9f_f2f5a171", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 56, 131 ]
[ null, null ]
[ 20, 16 ]
[ 61, 57 ]
2024-11-18T23:18:13.988897+00:00
1,584,874,522,000
a2b7f40953c5e44d1824f2e4f924bf02830890c7
3
{ "blob_id": "a2b7f40953c5e44d1824f2e4f924bf02830890c7", "branch_name": "refs/heads/master", "committer_date": 1584874522000, "content_id": "781c480e0b5f2ae8eec168d4a63d7c05d2f9d08f", "detected_licenses": [ "MIT" ], "directory_id": "0a5ca88fd282a46b0661f343ee44cf6bcbe73c22", "extension": "py", "fi...
3
stackv2
####################################################################### # Python script to convert DayOne exported JSON file with photos in # separate markdown files and photo files in subfolders ####################################################################### import json import os from shutil import copyfile ...
174
41.59
117
17
1,686
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3aacedce6a4404ad_d576fe4c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores ...
[ 127, 129, 131, 133, 141, 144 ]
[ null, null, null, null, null, null ]
[ 20, 20, 20, 20, 20, 20 ]
[ 51, 52, 51, 52, 51, 52 ]
2024-11-19T00:07:14.408169+00:00
1,543,228,402,000
ac1dec0de5fed340042f35999cb610b891e009ca
2
{ "blob_id": "ac1dec0de5fed340042f35999cb610b891e009ca", "branch_name": "refs/heads/master", "committer_date": 1543228402000, "content_id": "1a9f866c5d29d5507ab9a718a8e50f4485795d1d", "detected_licenses": [ "MIT" ], "directory_id": "3e65228cfbf992b3baa76230384d4db6a573332b", "extension": "py", "fi...
2.34375
stackv2
from paramiko.client import SSHClient, AutoAddPolicy from paramiko.ssh_exception import AuthenticationException from paramiko.rsakey import RSAKey from apps.setting import Setting from io import StringIO def generate_ssh_key(): key_obj = StringIO() key = RSAKey.generate(2048) key.write_private_key(key_obj...
82
28.85
104
15
561
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e0136e7f6ca61247_85be4325", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 17, 36, 72 ]
[ null, null, null ]
[ 5, 5, 5 ]
[ 58, 58, 58 ]
2024-11-19T00:07:16.258156+00:00
1,551,982,299,000
673bf87735f61c2409612eb8c013436cec08a4ee
3
{ "blob_id": "673bf87735f61c2409612eb8c013436cec08a4ee", "branch_name": "refs/heads/master", "committer_date": 1551982299000, "content_id": "21d52ccfc51bdc73e7054ae228a2b8276f827c63", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ba2d5f77f6c0c5d5fb916e41aee25a777ec35567", "extension": "py"...
2.9375
stackv2
import datetime import os from jinja2 import FileSystemLoader, Environment class Statistic: def __init__(self, link, link_name): self.link = link self.link_name = link_name link = "" link_name = "" class SubDirectory: def __init__(self, directory, title): self.directory = d...
58
26.91
99
15
354
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_17b161c86b2e3fec_9282eae1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 55 ]
[ null ]
[ 15 ]
[ 46 ]
2024-11-19T00:07:16.410534+00:00
1,452,017,179,000
1d6d369655ce6aa825446583939d655c09dacb46
2
{ "blob_id": "1d6d369655ce6aa825446583939d655c09dacb46", "branch_name": "refs/heads/master", "committer_date": 1452017179000, "content_id": "a3cf22a49840035d5853eeb9ae80e8400a920f40", "detected_licenses": [ "Unlicense" ], "directory_id": "dfa85cc243736da77ae15ae6ee14917b486c35aa", "extension": "py",...
2.40625
stackv2
from flask import Flask, render_template, request from showmestuff import app import requests import json @app.route("/bitcoin_balance", methods=["POST"]) def get_bitcoin_balance(): if request.method == 'POST': response = {} address = request.form['address'] # Get addres...
52
34.85
111
20
378
python
[{"finding_id": "codeql_py/partial-ssrf_2d7665a8508330bb_5f6c763d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 22 ]
[ 112 ]
2024-11-19T00:07:19.323390+00:00
1,619,544,512,000
c0786d9b1c8b16af2cd3f3a17a39d3c1263d2d75
3
{ "blob_id": "c0786d9b1c8b16af2cd3f3a17a39d3c1263d2d75", "branch_name": "refs/heads/master", "committer_date": 1619544512000, "content_id": "a63a07ec70cefa78e2445a74384c0228dbc72189", "detected_licenses": [ "MIT" ], "directory_id": "9c6c7f2ece1bf86b65d2b519ffc61de06d72279a", "extension": "py", "fi...
3.078125
stackv2
""" Module for user data accessing functions. """ import os from hashlib import sha256 from sqlalchemy.orm.exc import NoResultFound from models import User from exceptions import SocketIOEventError class LoginError(SocketIOEventError): """ Thrown when an issue preventing a successful login occurs. """ ev...
65
25.12
79
14
379
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_38d2aabd9567f2ca_bbc58200", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 39, 58 ]
[ null, null ]
[ 21, 19 ]
[ 45, 63 ]
2024-11-19T00:34:33.911468+00:00
1,513,048,135,000
74e5ab94e0c033f0e8dc6867cb82d2a3c26ed6f5
3
{ "blob_id": "74e5ab94e0c033f0e8dc6867cb82d2a3c26ed6f5", "branch_name": "refs/heads/master", "committer_date": 1513048135000, "content_id": "b0a6d5cbed0adbbec3be101b44d78391f152260e", "detected_licenses": [ "MIT" ], "directory_id": "d9968d26543b454ec3aa11b451acdcea4fb0ddb1", "extension": "py", "fi...
3.328125
stackv2
import random import logging BIRTHDAY = 1 PEOPLE = 25 PARTYS = 100000 SAME_BIRTHDAYS = 0 LOG_FILENAME = 'test.log' logging.basicConfig(filename=LOG_FILENAME, level=logging.DEBUG) if __name__ == "__main__": print('~~~~~~~~~~~~~~~~~~~~~\n') for i in range(PARTYS): birthdays = [rando...
29
26.59
88
12
230
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6c36cf9ac7b1f697_1a328c16", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 25 ]
[ null ]
[ 7 ]
[ 88 ]
2024-11-19T00:34:36.141577+00:00
1,423,238,059,000
420cfb00cd4dbf32c56955237fa7d158d0f39cb2
2
{ "blob_id": "420cfb00cd4dbf32c56955237fa7d158d0f39cb2", "branch_name": "refs/heads/master", "committer_date": 1423238059000, "content_id": "4bf9f830defde9e3b6e1b199e1aac83ab57cda2b", "detected_licenses": [ "MIT" ], "directory_id": "8736f2b594b9cd04b0f88654af6689e6c1699095", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask from flask import render_template import subprocess app = Flask(__name__) @app.route("/") def hello(): return render_template("index.html") @app.route("/eject") def eject(): try: ret = subprocess.call(["eject"]) if ret == 0: return "Eject!!" else: ...
35
19.77
46
13
176
python
[{"finding_id": "codeql_py/stack-trace-exposure_f6adcba722075619_7b3d137e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 20, 31 ]
[ null, null ]
[ 16, 16 ]
[ 22, 22 ]
2024-11-18T23:28:30.006570+00:00
1,686,801,785,000
e30f64f468cacafdd8b587481057b3d31aaa9973
3
{ "blob_id": "e30f64f468cacafdd8b587481057b3d31aaa9973", "branch_name": "refs/heads/main", "committer_date": 1690296907000, "content_id": "202ebced2cbed3a03a33f231ba3f99775944d941", "detected_licenses": [ "BSD-3-Clause", "Apache-2.0" ], "directory_id": "1cf6fdb7076a2e23ce664d434ec5f0ba08f8f84a", ...
2.703125
stackv2
""" Utility to autogenerate generic LL HAL headers. Usage:: python3 genllheaders.py [-p /path/to/HAL] [-o /path/to/output_dir] Copyright (c) 2020 Teslabs Engineering S.L. SPDX-License-Identifier: Apache-2.0 """ import argparse import logging from pathlib import Path import re import shutil from jinja2 import ...
126
24.78
81
15
781
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_50236830101e8393_3a2f819d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 85 ]
[ 87 ]
[ 11 ]
[ 6 ]
2024-11-18T23:28:30.720753+00:00
1,305,045,004,000
6af36e5b9483e0787c20a8a7f4c8b77aec757c38
3
{ "blob_id": "6af36e5b9483e0787c20a8a7f4c8b77aec757c38", "branch_name": "refs/heads/master", "committer_date": 1305045004000, "content_id": "676b6c8d189c51836d55cc1390b97c64f2c701e5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "849dd919b340b0daf8220dc57364522bd2e965d1", "extension": "p...
2.53125
stackv2
import sys, time, os, cPickle, struct, zlib import errno, fcntl from cStringIO import StringIO from disco.error import DataError MB = 1024**2 MIN_DISK_SPACE = 1 * MB MAX_RECORD_SIZE = 1 * MB HUNK_SIZE = 1 * MB CHUNK_SIZE = 64 * MB # chunk size seems to be ~ half what it should be class Chunker(object):...
201
30.19
95
17
1,509
python
[{"finding_id": "codeql_py/overly-permissive-file_3409a46b31e39453_b25a15cd", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world readable." ]
[ 166 ]
[ 167 ]
[ 18 ]
[ 60 ]
2024-11-18T23:28:36.136836+00:00
1,579,244,904,000
b89ca134c40af80c3727fa6a4d754a46ece07c29
2
{ "blob_id": "b89ca134c40af80c3727fa6a4d754a46ece07c29", "branch_name": "refs/heads/master", "committer_date": 1579244904000, "content_id": "91c3dcd64ec29b039820b71f2a340d0b81210f2c", "detected_licenses": [ "MIT" ], "directory_id": "94f33eb0c5dbafac6c563057e441fe0b868108ad", "extension": "py", "fi...
2.375
stackv2
import os import numpy as np import cv2 import sys import os import glob from sklearn import svm from scipy.stats import mode #from sklearn.ensemble import RandomForestClassifier #from sklearn.ensemble import AdaBoostClassifier import time ''' MIT License Copyright (c) 2020 Somnath Saha Permission is hereby granted,...
437
29.97
118
23
3,065
python
[{"finding_id": "codeql_py/url-redirection_780987f0c2d7590f_ff07591f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 143, 149 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-19T00:05:04.124068+00:00
1,671,138,217,000
373058509c3e2d6263ec7024b6b90447b4e07f55
3
{ "blob_id": "373058509c3e2d6263ec7024b6b90447b4e07f55", "branch_name": "refs/heads/main", "committer_date": 1671138217000, "content_id": "0c7b7a90d7f832733edf6a030d89ea9d45d1ba52", "detected_licenses": [ "MIT" ], "directory_id": "b9963ffb80aad7e057bc375edb85ac7ed5a837d0", "extension": "py", "file...
2.890625
stackv2
from hashlib import md5 max_x = 3 max_y = 3 passcode = 'yjjvjgan' passcode_len = len(passcode) queue = [(passcode, 0, 0)] been_here = {} def visited(x, y, next): if y not in been_here: been_here[y] = {} if x not in been_here[y]: been_here[y][x] = {} if next not in been_here[y][x]: ...
49
20.04
96
16
332
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_36d5f4358ad4c570_21ddcc9c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 31, 34 ]
[ null, null ]
[ 15, 55 ]
[ 38, 79 ]
2024-11-19T01:11:37.212122+00:00
1,462,494,114,000
bc6b62fc5e92ad13e54edc9f8c5ce67c2f502452
3
{ "blob_id": "bc6b62fc5e92ad13e54edc9f8c5ce67c2f502452", "branch_name": "refs/heads/master", "committer_date": 1462494114000, "content_id": "3cc0acd8e0e219c16f88a3bf194cedaca831f8a8", "detected_licenses": [ "MIT" ], "directory_id": "c3e4320f6143c779901d0f1d68ddb078f9f0aede", "extension": "py", "fi...
2.515625
stackv2
import json import logging import re import webapp2 from models import Watcher EMAIL_RE = re.compile(r'[^@]+@[^@]+\.[^@]+') active_terms = [{'code': t[0], 'name': t[1]} for t in [ (1164, 'Summer Intersession 2016'), (1166, 'Summer 2016'), (11...
63
35.9
74
15
553
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_7664dc3fa162a2e0_a820b74a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [uark.edu](1) may be at an arbitrary position in the sa...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [uark.edu](1) may be at an arbitrary position in the sanitized URL." ]
[ 26 ]
[ null ]
[ 21 ]
[ 47 ]
2024-11-18T23:46:46.895871+00:00
1,692,964,835,000
b1be844ec99624026cc9f3af8f38828eeb2ba94c
2
{ "blob_id": "b1be844ec99624026cc9f3af8f38828eeb2ba94c", "branch_name": "refs/heads/master", "committer_date": 1692965148000, "content_id": "b89e579694b2a2acf7dae9db2c0599f6b05ff2ab", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f35186c28241eb1c61f85ca425a5d4f5b440b9c7", "extension": "py"...
2.484375
stackv2
# -*- coding: utf-8 -*- # python std lib import json import logging import re # phabfive imports from phabfive.constants import MONOGRAMS from phabfive.core import Phabfive from phabfive.exceptions import PhabfiveDataException, PhabfiveRemoteException # 3rd party imports from phabricator import APIError log = logg...
67
29.01
147
17
465
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e7aea2fd5fb90963_6ef1d747", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 67 ]
[ null ]
[ 27 ]
[ 39 ]
2024-11-18T23:46:51.601934+00:00
1,630,555,199,000
2c8f2df3e182722e5d9209b4ac85fe49b85e54c8
3
{ "blob_id": "2c8f2df3e182722e5d9209b4ac85fe49b85e54c8", "branch_name": "refs/heads/main", "committer_date": 1630555199000, "content_id": "95407467a5ff0f24f309bb2e8a62a62dcd64ff25", "detected_licenses": [ "MIT" ], "directory_id": "b1de5cf7a949fd99675c0e9743a6bad868d1ae7e", "extension": "py", "file...
2.71875
stackv2
import praw import csv, codecs import re import time import matplotlib.pyplot as plt import threading BLOCK_SIZE = 300 exitFlag = 0 need_csv_file = False # Follow the instructions here: # https://towardsdatascience.com/how-to-use-the-reddit-api-in-python-5e05ddfd1e5c # to get your personal_use_script, secret, and nam...
260
29.65
108
22
1,837
python
[{"finding_id": "codeql_py/overly-large-range_2eabb00e800d3adb_50565ddd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class." ]
[ 145, 145, 145 ]
[ null, null, null ]
[ 30, 33, 36 ]
[ 34, 37, 40 ]
2024-11-18T23:48:13.158228+00:00
1,605,307,332,000
2690c60af401b5b8b0136e487a39cc5aa9cea476
3
{ "blob_id": "2690c60af401b5b8b0136e487a39cc5aa9cea476", "branch_name": "refs/heads/main", "committer_date": 1605307332000, "content_id": "fd157270e9495de0a19a549294516358b865156b", "detected_licenses": [ "MIT" ], "directory_id": "7acdacd7e6876a5d65f514322373d961c769ada8", "extension": "py", "file...
2.953125
stackv2
from datetime import datetime import os import pytz import requests import math import json API_KEY = 'OPEN_WEATHER_MAP_API_KEY' API_URL = ('https://api.openweathermap.org/data/2.5/onecall?lat={}&lon={}&exclude=minutely,alerts&appid={}') def weather_query(lat, lon): try: print(API_URL.format(...
38
28.58
108
15
271
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5a37c21fa2bbd3e8_611ea73a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 13 ]
[ null ]
[ 15 ]
[ 48 ]
2024-11-18T23:48:13.279198+00:00
1,609,704,364,000
9620f94c8b85a23c5c8bae91376d6ae20064b985
2
{ "blob_id": "9620f94c8b85a23c5c8bae91376d6ae20064b985", "branch_name": "refs/heads/master", "committer_date": 1609704364000, "content_id": "e97e6dc540a9a620d1984c9f31fe100cf1f7e7cf", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "3dcbf494463f4c5e6c640d236a3ab107f1f25996", "extension": "p...
2.4375
stackv2
import re from typing import List from urllib.parse import urljoin import httpx import js2py from faker import Faker from pydantic import parse_obj_as from kurby.constants import TWIST_URL, ANIME_ENDPOINT from kurby.decrypt import decrypt from kurby.schemas import Anime, AnimeDetails, AnimeSource from kurby.utils imp...
90
31.97
87
20
749
python
[{"finding_id": "codeql_py/bad-tag-filter_6d2e01419f2b5eb3_de73e551", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match upper case <SCRIPT> tags." ]
[ 27 ]
[ null ]
[ 25 ]
[ 47 ]
2024-11-19T00:44:12.630311+00:00
1,557,545,366,000
9f1430102e5d5567ad3328df85438a238133c7c7
3
{ "blob_id": "9f1430102e5d5567ad3328df85438a238133c7c7", "branch_name": "refs/heads/master", "committer_date": 1557545366000, "content_id": "0f3f19f5471edeb8ee37c9dad56fc62b45bb3efc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e0bfed179449f953ae5c4504f6f90e3b66c2096d", "extension": "py"...
3.234375
stackv2
import sys import os import struct import argparse import json import tempfile from Crypto.Cipher import AES from Crypto.PublicKey import RSA from Crypto.Cipher import PKCS1_OAEP def decrypt_file(key, in_filename, out_filename=None, chunksize=24*1024): """ Decrypts a file using AES (CBC mode) with the given key. ...
158
43.28
96
17
1,431
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7265407c5c082ab6_b9f99339", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text." ]
[ 79 ]
[ null ]
[ 15 ]
[ 44 ]
2024-11-19T00:44:20.818813+00:00
1,413,387,245,000
1f9ca84844831aba66b7218c040e954b3aac0b8a
3
{ "blob_id": "1f9ca84844831aba66b7218c040e954b3aac0b8a", "branch_name": "refs/heads/master", "committer_date": 1413387245000, "content_id": "481987da74721fd132b78a44ebbb0f86ea73832a", "detected_licenses": [ "MIT" ], "directory_id": "81b9ccaa8e97118ed7287432deac998ebed05d8b", "extension": "py", "fi...
2.515625
stackv2
# coding: utf-8 """ A microservice, that takes an URL and saves the url in some database. """ from flask import Flask, request, abort, jsonify, g from porc import Client import datetime import embedly import hashlib import json import nltk import os import requests import uuid # embedly embedly_client = embedly.Embe...
126
26.94
104
18
874
python
[{"finding_id": "codeql_py/stack-trace-exposure_e1525f0433d8f406_e960ceba", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-215", "CWE-918" ]
[ "py/stack-trace-exposure", "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 122, 126, 97 ]
[ null, null, null ]
[ 28, 5, 9 ]
[ 36, 40, 26 ]
2024-11-19T00:44:21.438126+00:00
1,587,664,776,000
9e23a16bb91df6707be28ddb0f61e6459b57794e
3
{ "blob_id": "9e23a16bb91df6707be28ddb0f61e6459b57794e", "branch_name": "refs/heads/master", "committer_date": 1587664776000, "content_id": "5482eff9cd5c4c4314bd4147df967fd5ee32081f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2f6c43c16d9fd38643552b7ff9eed55654bd0ecf", "extension": "py"...
2.703125
stackv2
# Copyright 2017-2019 Stanislav Pidhorskyi # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed t...
222
36.5
132
16
2,089
python
[{"finding_id": "codeql_py/tarslip_e70fb0cfa51082a0_419c7836", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 163 ]
[ null ]
[ 9 ]
[ 50 ]
2024-11-19T00:44:21.966228+00:00
1,587,894,722,000
3d1e53efd2007b1d168b09a3e3b8903cf585faf8
2
{ "blob_id": "3d1e53efd2007b1d168b09a3e3b8903cf585faf8", "branch_name": "refs/heads/master", "committer_date": 1587894722000, "content_id": "c16acec76df7dee2516060b8ce854a43e509af7e", "detected_licenses": [ "MIT" ], "directory_id": "a06dd64bda892191b5e6b4c829f06d9713977c53", "extension": "py", "fi...
2.34375
stackv2
from datetime import datetime from flask import (abort, flash, redirect, render_template, request, url_for) from flask_login import (current_user, login_required, login_user, logout_user) from werkzeug.urls import url_parse from klaverjas import app, db from klaverjas.forms...
133
33.03
79
17
909
python
[{"finding_id": "codeql_py/url-redirection_2a2100872681927a_bfe9b184", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 109 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-18T23:05:20.968161+00:00
1,564,683,823,000
76a6acf4499b2bacfd0002f500535881c492c6b8
3
{ "blob_id": "76a6acf4499b2bacfd0002f500535881c492c6b8", "branch_name": "refs/heads/master", "committer_date": 1564683823000, "content_id": "01110987dc51e1d4e3911a105213d6d0d557da7a", "detected_licenses": [ "MIT" ], "directory_id": "ae6042978489b559f538a57f9590091c3d4676f4", "extension": "py", "fi...
2.65625
stackv2
from __future__ import print_function import os import os.path import jinja2 import tempfile import time import webbrowser from IPython.display import IFrame TEMPLATES_PATH = os.path.join(os.path.dirname(__file__), '../templates/') j2_env = jinja2.Environment(loader=jinja2.FileSystemLoader(TEMPLATES_PATH), ...
110
29.08
108
16
756
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fd3f07a989e2a8c9_c4310558", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 14 ]
[ 15 ]
[ 10 ]
[ 46 ]
2024-11-18T23:11:00.753387+00:00
1,608,839,658,000
756005363e1383032afd2f660ba99f8921cf5121
3
{ "blob_id": "756005363e1383032afd2f660ba99f8921cf5121", "branch_name": "refs/heads/master", "committer_date": 1608839658000, "content_id": "e37b9950d1975756acf8dec2e62755202d3299a2", "detected_licenses": [ "MIT" ], "directory_id": "201812d0833747c84fbc6c2753b1958e31b6cc9a", "extension": "py", "fi...
3.46875
stackv2
import zipfile, time def bruteforce(file, list="lists\list100k.txt", list2="lists\list1m.txt"): zip = zipfile.ZipFile(file) #open the zipfile password = None counter = 0 startTime = time.time() #check when we started so we can know how much time it took us with open(list, "rt") as f: #open the first 100,000 passw...
47
35.91
113
17
473
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ed60f5ae8cb23106_58a130c4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19, 35 ]
[ null, null ]
[ 22, 22 ]
[ 30, 30 ]
2024-11-19T01:21:47.639759+00:00
1,679,672,095,000
3f7376be78df33a4fd3872f05344d4d893b20e20
3
{ "blob_id": "3f7376be78df33a4fd3872f05344d4d893b20e20", "branch_name": "refs/heads/master", "committer_date": 1679672095000, "content_id": "f41fca459491c5ecd2d0253dddeca05c5d745927", "detected_licenses": [ "MIT" ], "directory_id": "407a99d0e33d2553743031dfd9854dc2426e584f", "extension": "py", "fi...
3.046875
stackv2
# Database Handler from getpass import getpass from platform import system from clipboard import copy_text from crypt import hash_pass, encrypt_pass, decrypt_pass, encryptDB, decryptDB from generator import generate_password import sqlite3 import os __dbPath__ = "pvault.db" # Password Database Name def detect_path():...
153
29.85
95
19
1,004
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_57a08eb3a2355820_583e49a8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 112 ]
[ null ]
[ 23 ]
[ 87 ]
2024-11-19T00:11:42.806042+00:00
1,566,883,010,000
8b21fe1c0032f83b8312e48019d8f1654685b839
2
{ "blob_id": "8b21fe1c0032f83b8312e48019d8f1654685b839", "branch_name": "refs/heads/master", "committer_date": 1566883010000, "content_id": "9e563742732e33217b20dcafdf20430e233a9b72", "detected_licenses": [ "MIT" ], "directory_id": "c6a6a2d00c3c5351479cf82912bc0809fb37c976", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python3 import argparse import logging import os import sys import re import tarfile import time import shutil import json import requests log = logging.getLogger('') if __name__ == "__main__": parser = argparse.ArgumentParser(description='Reprocess an archived data folder') parser.add_argume...
77
32.38
97
16
565
python
[{"finding_id": "codeql_py/tarslip_7a978fc86beda196_c6b32518", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 49 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T00:24:53.909522+00:00
1,625,627,271,000
f6e08f6fc9f78e2f72009ec6f7978c0f305fe822
3
{ "blob_id": "f6e08f6fc9f78e2f72009ec6f7978c0f305fe822", "branch_name": "refs/heads/main", "committer_date": 1625627271000, "content_id": "2d3e7b2b839bb5d6d6c94bfdbafba9f0cd43ac82", "detected_licenses": [ "MIT" ], "directory_id": "07f4aafda850820fa51d05807ba92788788787f9", "extension": "py", "file...
2.75
stackv2
import base64 import os from cryptography.fernet import Fernet from cryptography.hazmat.primitives import hashes from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC def getKey (salt, password): print(password) print(salt) kdf = PBKDF2HMAC( algorithm=hashes.SHA256(), length=32...
54
21.11
72
14
346
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_173c9038efa59bf4_30add6de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 10 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-19T00:36:51.386689+00:00
1,527,571,884,000
4daf059ed0482e7862edfbbda67163081f0aced9
3
{ "blob_id": "4daf059ed0482e7862edfbbda67163081f0aced9", "branch_name": "refs/heads/master", "committer_date": 1527616683000, "content_id": "e4dc3b5ce03e7f671313b6b22c17fa0a2aa10ed5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "79d69df3b105a37364f4e54e0d263785405c266e", "extension": "p...
3.078125
stackv2
import bisect from http.server import HTTPServer, BaseHTTPRequestHandler, HTTPStatus import logging import threading from typing import Tuple logger = logging.getLogger(__name__) class Handler(BaseHTTPRequestHandler): def __init__(self, *args, **kw): self._paths = kw.pop('__paths') logger.debug('...
140
29.2
89
21
896
python
[{"finding_id": "codeql_py/insecure-default-protocol_3c2666510d19dd89_6f0a9e27", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
3
true
[ "CWE-327", "CWE-117", "CWE-117" ]
[ "py/insecure-default-protocol", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).\nThis log entry depends on a [user-provided value](3).", "This log entry dep...
[ 79, 34, 42 ]
[ 83, null, null ]
[ 34, 63, 51 ]
[ 14, 72, 60 ]
2024-11-19T00:36:55.414382+00:00
1,609,749,752,000
8fa8e6a497fdf417e8a87e0f19acaf63c5b2d143
3
{ "blob_id": "8fa8e6a497fdf417e8a87e0f19acaf63c5b2d143", "branch_name": "refs/heads/master", "committer_date": 1609749752000, "content_id": "fcd8a2f4e6b2e4e816a560b2d2b2113b5dac0982", "detected_licenses": [ "MIT" ], "directory_id": "19e55951af0fdd56e047875637350d6b6577e4d1", "extension": "py", "fi...
2.609375
stackv2
# Python script to download US nonprofit data from the Foundation Stats API: # - http://data.foundationcenter.org/about.html#api # Diarmuid McDonnell # Created: 09 March 2018 # Last edited: captured in Github file history import itertools import json import csv import re import requests, zipfile, io import os import...
61
27.69
123
11
454
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f20bed21a928cd63_aa970a6d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29 ]
[ null ]
[ 7 ]
[ 17 ]
2024-11-19T00:37:00.505840+00:00
1,541,573,902,000
529b490f378b54ce0f213416b4675cbd3be4eca8
2
{ "blob_id": "529b490f378b54ce0f213416b4675cbd3be4eca8", "branch_name": "refs/heads/master", "committer_date": 1541573902000, "content_id": "5859509ced4a213995e34fb2a67bf7a09875f047", "detected_licenses": [ "MIT" ], "directory_id": "b3e8aa381da1271a4342896d6df3cc52a2ffc543", "extension": "py", "fi...
2.375
stackv2
import requests from lxml import etree import os Headers = { 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8', 'Accept-Encoding': 'gzip, deflate', 'Accept-Language': 'zh,en-US;q=0.9,en;q=0.8,zh-TW;q=0.7,zh-CN;q=0.6', 'Cache-Control': 'no-cache', 'Con...
80
31.86
135
20
758
python
[{"finding_id": "codeql_py/request-without-cert-validation_160797b9e10edbfb_fa96fa72", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 61 ]
[ null ]
[ 21 ]
[ 86 ]
2024-11-19T01:02:13.182040+00:00
1,316,784,384,000
e34e53189ab872b7cc3c179556b9d42cdf420ad5
3
{ "blob_id": "e34e53189ab872b7cc3c179556b9d42cdf420ad5", "branch_name": "refs/heads/master", "committer_date": 1316784384000, "content_id": "709222f9af4a03eee79600aee71381fa30167ba5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f9d78b58b19166aa01391fccc6678b147f0f6295", "extension": "p...
3.03125
stackv2
""" An example reconciliation service API for Google Refine 2.0. See http://code.google.com/p/google-refine/wiki/ReconciliationServiceApi. """ import re from flask import Flask, request, jsonify, json app = Flask(__name__) # Basic service metadata. There are a number of other documented options # but this is all we ...
108
34.53
78
17
917
python
[{"finding_id": "codeql_py/flask-debug_f70bcb431f8bfe44_18e77847", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-730", "CWE-079" ]
[ "py/flask-debug", "py/regex-injection", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This regular expression depends on a [user-provided value](1) and is executed by [re.search](2).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 108, 41, 72 ]
[ null, null, null ]
[ 5, 26, 38 ]
[ 24, 31, 76 ]
2024-11-19T01:02:24.047909+00:00
1,672,227,199,000
ae5d1eafc3b372118ca2c50399be5f3392888d61
4
{ "blob_id": "ae5d1eafc3b372118ca2c50399be5f3392888d61", "branch_name": "refs/heads/master", "committer_date": 1672227199000, "content_id": "6b65ab5436920f0d3c38cb401088ac9488dbafe6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e8efa40c295bc86fe7fd621ae91e41ed52737e9d", "extension": "py"...
3.5625
stackv2
import random import string def create_password(password_length= 12,contains_non_ascii = False): password = "" for i in range(password_length): if contains_non_ascii: password_char = random.choice(string.printable) else: password_char = random.choice(string.ascii_lette...
23
23.74
68
14
121
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e5519f643fe51f8a_e23bb6e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 23 ]
[ null ]
[ 14 ]
[ 22 ]
2024-11-19T01:26:12.548320+00:00
1,542,561,279,000
4bef61a1d17450a3c4169bfc37396ff8dca4f420
3
{ "blob_id": "4bef61a1d17450a3c4169bfc37396ff8dca4f420", "branch_name": "refs/heads/master", "committer_date": 1542561279000, "content_id": "9a0fc048159706c970c582d223e4dc16f93026e6", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "89c1a23daa5a07f6365ec5b696218905b619b1bf", "extension": "p...
2.625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- '''A DCC-agnostic adapter class to inherit and extend for software.''' # IMPORT STANDARD LIBRARIES import logging import tarfile import zipfile import abc import os # IMPORT LOCAL LIBRARIES from ..strategies import internet from ..utils import progressbar from ..utils im...
318
31.31
97
19
2,064
python
[{"finding_id": "codeql_py/tarslip_d0d50d5a670afff7_6a8fd361", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 86 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-18T23:43:30.277033+00:00
1,528,727,020,000
624c816e000d74241ca3ab16d09c675682c550dd
3
{ "blob_id": "624c816e000d74241ca3ab16d09c675682c550dd", "branch_name": "refs/heads/master", "committer_date": 1528727020000, "content_id": "0a6a8f621e21b72d6803d3dd41527287878d67be", "detected_licenses": [ "MIT" ], "directory_id": "32552e36d6607c92e1d65bdcd69d28dbd58aa373", "extension": "py", "fi...
2.5625
stackv2
from flask import render_template, redirect, request, url_for, flash from flask_login import login_user, logout_user, login_required, \ current_user from . import auth from .. import db from ..models import User from ..email import send_email from .forms import LoginForm, RegistrationForm, ChangePasswordForm,\ ...
107
32.25
73
16
855
python
[{"finding_id": "codeql_py/url-redirection_ce642079eea1046e_cbb29b9c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 29 ]
[ 33 ]
2024-11-18T23:43:32.385575+00:00
1,585,553,587,000
d34138742a3eb72592487399c57b94c7e9bbd0de
3
{ "blob_id": "d34138742a3eb72592487399c57b94c7e9bbd0de", "branch_name": "refs/heads/master", "committer_date": 1585553587000, "content_id": "410ba125f9b4dbbac7a0612df5a867a2898ccc8b", "detected_licenses": [ "MIT" ], "directory_id": "7fbc9acf7e019f1f13ebe60dea29731c4428fa0e", "extension": "py", "fi...
2.78125
stackv2
import pandas as pd import html import unicodedata import re import string import itertools import nltk from nltk.tokenize import TweetTokenizer tknzr = TweetTokenizer() ws_pattern = re.compile(r'\s+') first_split_pattern = re.compile('(.)([A-Z]+[a-z]+(?:[-][A-Z+a-z]+)*)') second_split_pattern = re.compile('([a-z0-9]...
142
26.87
98
18
1,014
python
[{"finding_id": "codeql_py/overly-large-range_a469b2baeae6f234_52f6aabd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[=>?@A-Z\\\\[\\\\\\\\]^_\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 22 ]
[ null ]
[ 50 ]
[ 53 ]
2024-11-19T00:33:02.071479+00:00
1,476,381,574,000
aeb9c2fcc22d440acb3cca6ce78d4fdff73aad61
3
{ "blob_id": "aeb9c2fcc22d440acb3cca6ce78d4fdff73aad61", "branch_name": "refs/heads/master", "committer_date": 1476381574000, "content_id": "c30210a685ee9e1ad92ce3915520a695f788f357", "detected_licenses": [ "MIT" ], "directory_id": "8ce93184f8d67e8563500fc5d7afba367266dfff", "extension": "py", "fi...
2.609375
stackv2
# -*- coding: utf-8 -*- try: from os import getuid except ImportError: def getuid(): return 4000 from flask import Flask, request, render_template from pprint import pformat app = Flask(__name__) @app.route("/") @app.route("/index.html") def index(): return render_template( "index.html", u...
41
19.78
49
12
223
python
[{"finding_id": "codeql_py/flask-debug_2f50345677b11cbc_8d3749a5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 41, 37 ]
[ null, null ]
[ 5, 9 ]
[ 48, 37 ]
2024-11-19T00:33:02.470412+00:00
1,605,800,690,000
ca7092e187e1f25f605bcd0b8cf9f2849cb390e8
2
{ "blob_id": "ca7092e187e1f25f605bcd0b8cf9f2849cb390e8", "branch_name": "refs/heads/master", "committer_date": 1605800690000, "content_id": "c29b74770b05e8dcf0a2e546309371d0fee84625", "detected_licenses": [ "MIT" ], "directory_id": "00426559fbef12d8457398bc89b4e05b11080c22", "extension": "py", "fi...
2.484375
stackv2
from fastapi import FastAPI, HTTPException, Response from fastapi.responses import HTMLResponse, FileResponse import json from fastapi.staticfiles import StaticFiles from pydantic import BaseModel from fastapi_utils.tasks import repeat_every import time import random import hashlib from fastapi.encoders import jsonable...
213
26.17
97
20
1,471
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8d11af832f1e7792_fd97e264", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 61, 56 ]
[ null, null ]
[ 11, 11 ]
[ 18, 30 ]
2024-11-19T00:02:43.041234+00:00
1,631,871,909,000
be9b06d1198e65e29f674896ecfa113d7d9a4cf4
3
{ "blob_id": "be9b06d1198e65e29f674896ecfa113d7d9a4cf4", "branch_name": "refs/heads/main", "committer_date": 1631871909000, "content_id": "ce9cb5b05b26fb6901ce777a7497f9c43c16143d", "detected_licenses": [ "MIT" ], "directory_id": "1d6d39e250a7e326bd15d98200f6fc22d57bb211", "extension": "py", "file...
2.625
stackv2
"""Regex utils for AwesomeVersion.""" import re from typing import Any, Match, Optional, Pattern # General purpose patterns RE_DIGIT = re.compile(r"[a-z]*(\d+)[a-z]*") RE_VERSION = re.compile(r"^(v|V)?(.*)$") RE_MODIFIER = re.compile(r"^((?:\d+\-|\d|))(([a-z]+)\.?(\d*))$") # Version patterns RE_CALVER = re.compile(r...
50
35.02
100
10
632
python
[{"finding_id": "codeql_py/redos_c092e52b7cb807fa_a088cb53", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'." ]
[ 24 ]
[ null ]
[ 35 ]
[ 38 ]
2024-11-19T00:02:47.151048+00:00
1,527,262,233,000
9514f91cd17a4a1c7cfd2bd5d51369747b638966
3
{ "blob_id": "9514f91cd17a4a1c7cfd2bd5d51369747b638966", "branch_name": "refs/heads/master", "committer_date": 1527262233000, "content_id": "b63bfc4d7e8bcf940903133fe65a861e236f6904", "detected_licenses": [ "MIT" ], "directory_id": "8fbf65ef02cd48d247cfe777580422be18237726", "extension": "py", "fi...
2.640625
stackv2
from flask import render_template,redirect,url_for,flash,request from . import auth from flask_login import login_user,logout_user,login_required, current_user from ..models import User from .forms import LoginForm,RegistrationForm from .. import db from app import login_manager @login_manager.user_loader def load_us...
64
32.52
110
16
446
python
[{"finding_id": "codeql_py/url-redirection_d286ec10d7498e78_7451be77", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 51 ]
[ null ]
[ 29 ]
[ 77 ]
2024-11-19T00:15:32.273944+00:00
1,591,961,322,000
7cabb4640860243095c1a72cbc38d55c5a752566
3
{ "blob_id": "7cabb4640860243095c1a72cbc38d55c5a752566", "branch_name": "refs/heads/master", "committer_date": 1591961322000, "content_id": "1d0f69e6f068e06bba28635a02b83dfb521dfe03", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "1b044639cc2bb532d8839e976399cefeda591b0e", "exten...
2.515625
stackv2
import flask, os, sys,time from flask import request,render_template,send_file,Flask import subprocess from shutil import copyfile import textrank import FSM app = Flask(__name__, static_folder='pdf') def html_and_txt(file_name): path = os.getcwd().replace('\\','/') + '/pdf' cmd_docker = 'docker run -idt --rm...
46
33.76
159
15
460
python
[{"finding_id": "codeql_py/command-line-injection_bb0584db4028b9f4_b9eb6386", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
6
true
[ "CWE-078", "CWE-078", "CWE-078", "CWE-215", "CWE-022", "CWE-022" ]
[ "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This pat...
[ 13, 14, 15, 46, 32, 39 ]
[ null, null, null, null, null, null ]
[ 21, 21, 21, 5, 20, 26 ]
[ 31, 31, 98, 51, 29, 69 ]
2024-11-19T00:25:29.549732+00:00
1,572,894,781,000
58b43c7e61a0d78076f7de2c9fcbb89b03fb506d
2
{ "blob_id": "58b43c7e61a0d78076f7de2c9fcbb89b03fb506d", "branch_name": "refs/heads/master", "committer_date": 1572894781000, "content_id": "546fe3b3105cd01ffc3d3df52f7a5dad1063c442", "detected_licenses": [ "MIT" ], "directory_id": "ca4905eee5d61f075867fda061bab68b25dabaca", "extension": "py", "fi...
2.453125
stackv2
from flask import Flask, request, render_template from flask_restful import Resource, Api from sqlalchemy import create_engine from json import dumps import arrow from geojson import Point, Feature, FeatureCollection, dump from collections import defaultdict #Create a engine for connecting to SQLite3. #Assuming salar...
95
38.42
179
20
849
python
[{"finding_id": "codeql_py/sql-injection_cb045486892af267_482d5049", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 30 ]
[ 130 ]
2024-11-19T00:25:32.791476+00:00
1,633,878,841,000
774f9cadbd8a232a007e69d6de7061ba70421d4a
3
{ "blob_id": "774f9cadbd8a232a007e69d6de7061ba70421d4a", "branch_name": "refs/heads/main", "committer_date": 1633878841000, "content_id": "c8baad290f4cb949388236761be605e642ed2d6f", "detected_licenses": [ "MIT" ], "directory_id": "ef036f1e0d1f0d6b5890ab1fd634162d37bae566", "extension": "py", "file...
2.6875
stackv2
from flask_restful import Resource, Api from flask import request from apscheduler.schedulers.background import BackgroundScheduler import atexit import time import json import os from app import app as application class API(Resource): def get(self, room_id): """ Receiver gets offer, Sender gets a...
69
23.57
84
15
394
python
[{"finding_id": "codeql_py/path-injection_dfffeadca8d211f4_45a41ef8", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 16, 23 ]
[ null, null ]
[ 19, 19 ]
[ 38, 38 ]
2024-11-19T00:25:38.392442+00:00
1,629,834,597,000
14797850fb27754d03ff87e1911235e4f485fcff
3
{ "blob_id": "14797850fb27754d03ff87e1911235e4f485fcff", "branch_name": "refs/heads/main", "committer_date": 1629834597000, "content_id": "135afd4e4d9d626763a05280df47fcdc96ab5ebc", "detected_licenses": [ "MIT" ], "directory_id": "d561d9d796398cff7a97d20ea308e1a4ce559982", "extension": "py", "file...
2.578125
stackv2
from google.auth import jwt from google.auth import _helpers from google.auth.transport import requests from google.oauth2 import id_token import facebook # overriding _verify_iat_and_exp to account for server system clock # being behind by approximately 25 minutes def _verify_iat_and_exp_edited(payload): """Verif...
67
32.18
96
15
488
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4c42b1b9124684bd_24d574ec", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [accounts.google.com](1) may be at an arbitrary positio...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [accounts.google.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 50 ]
[ null ]
[ 16 ]
[ 54 ]
2024-11-19T00:16:10.204498+00:00
1,540,856,300,000
7270079df843709de5c499184a72a1b641b5ebd5
2
{ "blob_id": "7270079df843709de5c499184a72a1b641b5ebd5", "branch_name": "refs/heads/master", "committer_date": 1540856300000, "content_id": "11418d7fe0caa7d00e5a43ef8858e93e3005f09b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d535d5c87111cbab5aa4fd4726982837926adc02", "extension": "py"...
2.390625
stackv2
""" Copyright 2017 Fastboot Mobile, LLC. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agree...
112
31.64
114
13
843
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3792bb430596d236_7257e62b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 87 ]
[ null ]
[ 11 ]
[ 60 ]
2024-11-19T00:28:32.166902+00:00
1,518,763,945,000
1f23c431641bb75b7ec2cd42b3e8e3508cb010e1
2
{ "blob_id": "1f23c431641bb75b7ec2cd42b3e8e3508cb010e1", "branch_name": "refs/heads/master", "committer_date": 1518763945000, "content_id": "d1f339acbe14be54d5140aa242020d3d6e21d22a", "detected_licenses": [ "MIT" ], "directory_id": "9b352177922814ca462a4425137eea518f2888a8", "extension": "py", "fi...
2.4375
stackv2
# -*- coding: utf-8 -*- from __future__ import unicode_literals import os import sys import create_reply from flask import Flask, request, abort from linebot import ( LineBotApi, WebhookParser ) from linebot.exceptions import ( InvalidSignatureError ) from linebot.models import ( MessageEvent, TextMessag...
70
24.99
76
13
406
python
[{"finding_id": "codeql_py/log-injection_39e43f63ae7bff27_ddf03c10", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 21 ]
[ 44 ]
2024-11-19T00:28:38.268540+00:00
1,574,029,901,000
81439ec42c1377ca8f8911fbbb9939b0534f9512
3
{ "blob_id": "81439ec42c1377ca8f8911fbbb9939b0534f9512", "branch_name": "refs/heads/master", "committer_date": 1574029901000, "content_id": "6a5a7f27210e81a0cee339643cd89d36c56c0022", "detected_licenses": [ "MIT" ], "directory_id": "1fde49a4951008810d64e5181e5a04528cc4b12e", "extension": "py", "fi...
2.890625
stackv2
import requests # api_host = "vcm-9129.vm.duke.edu" api_host = "http://127.0.0.1:5000/" def post_new_patients(patient_id, attending_email, user_age): """ Makes new patient information POST request to /api/new_patient Args: patient_id: patient id in string or int attending_email: patient's...
123
28.58
78
11
907
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c53174d56e97f130_081eb925", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive dat...
[ 111, 114, 117, 120 ]
[ null, null, null, null ]
[ 11, 11, 11, 11 ]
[ 16, 25, 18, 17 ]
2024-11-19T00:28:41.525036+00:00
1,475,646,736,000
6cdbaed733b69b37f100a4af0f2bd72cb82653de
3
{ "blob_id": "6cdbaed733b69b37f100a4af0f2bd72cb82653de", "branch_name": "refs/heads/master", "committer_date": 1475646736000, "content_id": "154afb9650ffa63c97d70ba08588598e7ec40831", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f9457ea82b6cc7262403b10d3c9ed4f4ad492fef", "extension": "py"...
3
stackv2
"""Application body""" import os from urllib.error import HTTPError from urllib.request import urlopen from app.auth import HubAuth from flask import Flask, redirect from webargs import Arg from webargs.flaskparser import use_args def create_app(config='production'): app = Flask(__name__, static_url_path='/static'...
73
29.04
72
17
500
python
[{"finding_id": "codeql_py/full-ssrf_c8881c01d3f5d706_3d959034", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-079" ]
[ "py/full-ssrf", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 54, 39 ]
[ null, 40 ]
[ 9, 11 ]
[ 24, 25 ]
2024-11-19T00:28:41.819732+00:00
1,675,943,305,000
a1bdc4474573f4e260493d31222712a90005b362
3
{ "blob_id": "a1bdc4474573f4e260493d31222712a90005b362", "branch_name": "refs/heads/master", "committer_date": 1675943305000, "content_id": "e71fa31e934330320f10d0a34ce43c06c08a4d95", "detected_licenses": [ "Apache-2.0" ], "directory_id": "07addf6da975492b53df3be57559ebbbd83ad1c1", "extension": "py"...
2.8125
stackv2
from jinja2 import Template from cfn_sphere import FileLoader import os import json import yaml from cfn_sphere.exceptions import CfnSphereException class FileGenerator(object): def __init__(self, working_dir): self.working_dir = working_dir @staticmethod def _write_file(file_path, working_dir,...
64
30.09
100
16
426
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_24d4d6f8584d642c_24e07c93", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 60 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-19T00:50:16.765506+00:00
1,614,831,968,000
9c236a8262094ee268e4aa7702bdf309d5eec5ba
2
{ "blob_id": "9c236a8262094ee268e4aa7702bdf309d5eec5ba", "branch_name": "refs/heads/main", "committer_date": 1614831968000, "content_id": "29332546e0954518986f40cd7680efb1b828152e", "detected_licenses": [ "MIT" ], "directory_id": "5cd2dff92ed1b20dfa531c056f10cc7e3a0a96a8", "extension": "py", "file...
2.375
stackv2
#!/bin/python3 import paramiko import getpass import time import subprocess devices = { 'r1': { 'ip': '127.0.0.1', }, 'r3': { 'ip': '127.0.0.1' } } user = "cisco" password = "cisco" command = "show ip int b\n" def get_connection(ip, user, password): ssh = paramiko.SSHClient() ...
42
23.79
78
11
286
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_203204c1808dbfc8_53a00636", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 24 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T01:30:49.226760+00:00
1,625,021,656,000
658cbad9e2134592b07fcba19e47759cc570649c
2
{ "blob_id": "658cbad9e2134592b07fcba19e47759cc570649c", "branch_name": "refs/heads/main", "committer_date": 1625021656000, "content_id": "10156a4d206adeff4c7b15ca70bb3039927ec269", "detected_licenses": [ "MIT" ], "directory_id": "a94755eb3bd727056b7371fd80cc48aa2c620593", "extension": "py", "file...
2.390625
stackv2
from flask import Flask, redirect, url_for, request, render_template from pymysql import connect, cursors from flask_cors import CORS import subprocess app = Flask(__name__) CORS(app) def restart_mysql_service(): command = 'service mysql restart' process = subprocess.Popen(command.split(), stdout=subprocess...
69
35.33
140
21
522
python
[{"finding_id": "codeql_py/flask-debug_6a2d05e02409eeae_a954e1c9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-089" ]
[ "py/flask-debug", "py/reflective-xss", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 68, 20, 38 ]
[ null, null, null ]
[ 5, 12, 32 ]
[ 51, 31, 43 ]
2024-11-19T02:00:57.386721+00:00
1,609,235,219,000
67377cb4a0a25d335f2cda7b6aeda6efd67db8ac
3
{ "blob_id": "67377cb4a0a25d335f2cda7b6aeda6efd67db8ac", "branch_name": "refs/heads/main", "committer_date": 1609235219000, "content_id": "4f687327cfa33eed18fbcc554cbbfb33f7778b8b", "detected_licenses": [ "MIT" ], "directory_id": "3337686fd5123a0845269956006d82cf237b6c65", "extension": "py", "file...
2.671875
stackv2
from flask import Flask app = Flask(__name__) @app.route('/') def index(): return "Labrīt!!!!!" @app.route('/sveiki') def sveiki(): return "Vairs nav nekāds rīts" @app.route('/sveiki/<vards>') def sveikiPersona(vards): return "Sveiki, {}".format(vards) @app.route('/cik/<sk1>/<sk2>') def reizinajums(sk1,...
25
18.04
37
9
160
python
[{"finding_id": "codeql_py/flask-debug_659711a0a3ff8253_4e51ea9d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 25, 15 ]
[ null, null ]
[ 5, 12 ]
[ 35, 38 ]
2024-11-19T00:04:26.179920+00:00
1,680,237,803,000
a5af37865a24c40c8f69e3ade4557b8d9a282d24
2
{ "blob_id": "a5af37865a24c40c8f69e3ade4557b8d9a282d24", "branch_name": "refs/heads/master", "committer_date": 1680237803000, "content_id": "07096fdba4be02050671b0509436796449aab223", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f1824cf2393b49c099b28f4c32383e930eae1c66", "extension": "py"...
2.421875
stackv2
#!/usr/bin/python from os import path as osp from flask import Flask, jsonify, request, abort from tracker import SOTTracker import requests import json # init the server app = Flask('tracking') # function module configuration data_root = '/data' service_port = 8899 TIMEOUT_SEC = 2 # time-out in seconds for sending...
142
29.32
83
17
1,096
python
[{"finding_id": "codeql_py/full-ssrf_f1883aa1b9550d29_0d5b2b9f", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
3
true
[ "CWE-918", "CWE-022", "CWE-022" ]
[ "py/full-ssrf", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 113, 86, 94 ]
[ 117, null, null ]
[ 17, 27, 23 ]
[ 37, 35, 31 ]
2024-11-19T00:40:14.699263+00:00
1,586,358,541,000
9294a720e8da1e8a1ebc9e5385da8ddf861bcacb
3
{ "blob_id": "9294a720e8da1e8a1ebc9e5385da8ddf861bcacb", "branch_name": "refs/heads/master", "committer_date": 1586358541000, "content_id": "0a6ec8aa22aa24fb2417445dc31627dae7276680", "detected_licenses": [ "MIT" ], "directory_id": "7ebea1f051a311b4f20dabfc5869b80d15f7ac5c", "extension": "py", "fi...
2.875
stackv2
import json import logging import random import constants import requests from requests.exceptions import ConnectionError def set_headers(token): headers = { 'Content-Type': 'application/json', 'Authorization': 'Bearer ' + token, } return headers def reset_headers(): return { ...
125
29.62
118
18
801
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0b84c888cee4d936_a4250051", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 55 ]
[ null ]
[ 18 ]
[ 74 ]