added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T01:18:06.703177+00:00
1,494,856,473,000
381e81fb37f025c3f4d642eb1f92e8e91bfe39ce
2
{ "blob_id": "381e81fb37f025c3f4d642eb1f92e8e91bfe39ce", "branch_name": "refs/heads/master", "committer_date": 1494856473000, "content_id": "367eb3ee84044bab0d8793f084f3ed6a7faf4334", "detected_licenses": [ "MIT" ], "directory_id": "07d5af38ecbafd8226866d109b58a6a4f7d03f4d", "extension": "py", "fi...
2.4375
stackv2
import logging import json import six from jinja2 import Template, TemplateError from bs4 import BeautifulSoup from lxml import etree from .utils import bake_parametrized from .html import deep_recursion, extract_text logger = logging.getLogger(__name__) def jinja_transform(code, content, conf): html = LazyHT...
109
22.47
64
16
555
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f2273305d656b4ee_6833b96a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 27 ]
[ null ]
[ 16 ]
[ 30 ]
2024-11-19T01:18:11.024085+00:00
1,630,000,174,000
3dce4990fcd1633aef9578648ee43d8feb0d12da
2
{ "blob_id": "3dce4990fcd1633aef9578648ee43d8feb0d12da", "branch_name": "refs/heads/main", "committer_date": 1630000174000, "content_id": "2a695ea5e70207fdd612b2d2ed2588db27258ac7", "detected_licenses": [ "MIT" ], "directory_id": "7d236509de58d05d15a3b821e8acd1c438d7deb9", "extension": "py", "file...
2.40625
stackv2
import re import ssl import sys from pysphere import VIServer def vcenter_conn(host, username, password): # if your vcenter (or vsphere) have a valid ssl cert, or doesn't have cert, comment next two lines. default_context = ssl._create_default_https_context ssl._create_default_https_context = ssl._create...
42
27.12
103
12
301
python
[{"finding_id": "codeql_py/overly-large-range_5daf0afeba04edb8_207c84aa", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 22 ]
[ null ]
[ 34 ]
[ 37 ]
2024-11-19T00:02:46.088424+00:00
1,691,037,619,000
2e5506a7dd13f9597598289f3118c04f2bea9e49
3
{ "blob_id": "2e5506a7dd13f9597598289f3118c04f2bea9e49", "branch_name": "refs/heads/master", "committer_date": 1691037619000, "content_id": "c1a38d940df3346be2285656a8f253996f5f54c1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7dfc958846a98c9dc90829ace237adb0f4e79057", "extension": "py"...
2.921875
stackv2
""" TaskGroup allows group tasks together. It enables syntactic sugar when adding dependencies explicitly (e.g., (t1 + t2) >> t3). It also allows creating multiple tasks at once using a parameters array. There are two potential cases that we haven't implemented: 1. Automatically generate an array of tasks to apply...
358
33.48
88
21
2,473
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_60bd6cf8a82fc7bd_a8c14385", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially...
[ 184, 201, 332, 350 ]
[ 188, null, 336, 354 ]
[ 33, 44, 22, 24 ]
[ 22, 71, 10, 6 ]
2024-11-19T00:25:36.224149+00:00
1,603,521,295,000
3300cb805300afc75e40b94183a9e2cfb8014ee6
2
{ "blob_id": "3300cb805300afc75e40b94183a9e2cfb8014ee6", "branch_name": "refs/heads/main", "committer_date": 1603521295000, "content_id": "27a8d4c16a39f10828a54321df45d029cfb386a7", "detected_licenses": [ "MIT" ], "directory_id": "e12cb56bc2ff5ff6dd973235d125cdaf187db319", "extension": "py", "file...
2.4375
stackv2
import socket from cryptography.fernet import Fernet import base64 from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC from cryptography.fernet import InvalidToken from cryptography.hazmat.primitives.asymmetric import padding from cryptography.hazmat.primitives import hashes from math import ceil from cryp...
177
34.93
115
19
1,375
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b3bf13e3ab52031e_02286f14", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 87 ]
[ null ]
[ 20 ]
[ 24 ]
2024-11-19T01:02:46.876882+00:00
1,406,739,033,000
92b8f5d0bb98ec310e175f28df1279ace524990c
2
{ "blob_id": "92b8f5d0bb98ec310e175f28df1279ace524990c", "branch_name": "refs/heads/master", "committer_date": 1406739033000, "content_id": "bd3a7caa00acf29b653f7a2bcdcbdfa680723969", "detected_licenses": [ "MIT" ], "directory_id": "96e49318e685019cbea95b9a7a9428a557e0a145", "extension": "py", "fi...
2.3125
stackv2
from re import match from random import random, choice from flask import jsonify, request, url_for from flask.ext.mail import Message from sqlalchemy.orm.exc import NoResultFound from streamScript.webAPI import app, mail, db from streamScript.webAPI.auth.models import APIKey from streamScript.webAPI.places import place...
68
30.16
74
15
492
python
[{"finding_id": "codeql_py/polynomial-redos_b17309f8f204a22b_3772fd23", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '!@' and with many repetitions of '!@'." ]
[ 41 ]
[ null ]
[ 40 ]
[ 45 ]
2024-11-19T00:50:15.873411+00:00
1,569,506,665,000
3986dd2daa831225df0d8c22214396993adb969f
3
{ "blob_id": "3986dd2daa831225df0d8c22214396993adb969f", "branch_name": "refs/heads/master", "committer_date": 1569506665000, "content_id": "70a7fc9950eb5b0eff169723dd80adfe0ed35221", "detected_licenses": [ "MIT" ], "directory_id": "4ada7aa922154f5aefd2c5ae83ea5e4e3a392c6d", "extension": "py", "fi...
2.59375
stackv2
from django.shortcuts import render # Create your views here. # CRUDL - 이미지를 띄우는 방법 # 제네릭 뷰 # 쿼리셋 변경하기, context_data 추가하기, 권한 채크 # 함수형 뷰 <-> 클래스형 뷰 from django.views.generic.list import ListView from django.views.generic.detail import DetailView from django.views.generic.edit import CreateView, UpdateView,DeleteView ...
223
29.57
89
18
1,786
python
[{"finding_id": "codeql_py/url-redirection_b943cf0b0e6056a9_88e23193", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 161, 194 ]
[ null, null ]
[ 41, 41 ]
[ 45, 45 ]
2024-11-19T01:30:55.046531+00:00
1,628,780,732,000
26c1bfa825a98c7d79fe7fc8f193a8d4e29250f6
2
{ "blob_id": "26c1bfa825a98c7d79fe7fc8f193a8d4e29250f6", "branch_name": "refs/heads/main", "committer_date": 1628780732000, "content_id": "b67cf7a8f7538ddfa9b5eea4834109ccfa4a1ca4", "detected_licenses": [ "MIT" ], "directory_id": "fb81385bd300ba11e72f58ffffcebbb9d2a8e82c", "extension": "py", "file...
2.453125
stackv2
import os, io, math, random, secrets, cloudinary.uploader, cloudinary.api, cloudinary, datetime from flask.templating import render_template_string from flask import Blueprint, render_template, request, redirect, flash, jsonify, make_response from flask_login import login_required, login_user, logout_user, current_use...
229
30.04
108
17
1,664
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a227623f2560f431_3753d07d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 38 ]
[ null ]
[ 11 ]
[ 30 ]
2024-11-19T02:00:56.475859+00:00
1,567,719,877,000
49e3736c467592a6ce76ea8d34b6111173277fd6
3
{ "blob_id": "49e3736c467592a6ce76ea8d34b6111173277fd6", "branch_name": "refs/heads/master", "committer_date": 1567719877000, "content_id": "4a73603d48d9b4c6fba32ed439d7f768c0247df9", "detected_licenses": [ "MIT" ], "directory_id": "f27f72c14f926ae3808d70fe06c12d5517bb2a45", "extension": "py", "fi...
3.21875
stackv2
import paramiko import re from collections import namedtuple APC_SHELL_PROMPT = 'apc>' SUCCESS = 'Success' Connection = namedtuple('Connection', 'host user psw') Response = namedtuple('Response', 'output result') class SSH(object): """ SSH Connection Object Defines a ssh client to be used by other appli...
131
31
104
16
938
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5d6bb0a35004e07e_221ef35c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 24 ]
[ null ]
[ 9 ]
[ 79 ]
2024-11-19T02:00:57.721620+00:00
1,492,190,004,000
c2f94315c5ba59eeadc6ec81f2252169862510cd
3
{ "blob_id": "c2f94315c5ba59eeadc6ec81f2252169862510cd", "branch_name": "refs/heads/master", "committer_date": 1492190004000, "content_id": "2a2691d4a47db9381087d950f2a948bae2282c8b", "detected_licenses": [ "MIT" ], "directory_id": "15d03333c943f56a9ff7bbd5762257a797519968", "extension": "py", "fi...
2.53125
stackv2
import mechanize import signal def facebook_brute(): br=mechanize.Browser() print("[*]Browser Initialized[*]") br.set_handle_equiv(True) br.set_handle_redirect(True) br.set_handle_referer(True) br.set_handle_robots(False) br.open('https://www.facebook.com/') email_username=raw_inp...
44
24.8
103
18
294
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6de603dd286aca9e_b1e22e5d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 28, 37 ]
[ null, null ]
[ 11, 39 ]
[ 76, 103 ]
2024-11-19T00:04:33.972956+00:00
1,445,266,235,000
03669dd5c61d127605005cc8eac1f382694bf4ba
2
{ "blob_id": "03669dd5c61d127605005cc8eac1f382694bf4ba", "branch_name": "refs/heads/master", "committer_date": 1445266235000, "content_id": "1fd27a6636d29611a427ff513d33d7962c33e1fc", "detected_licenses": [ "MIT" ], "directory_id": "7bae2e5a99fb4c4513bf9e4061cfc88c988f8189", "extension": "py", "fi...
2.5
stackv2
# -*- coding: utf-8 -*- from jinja2 import Template import os from apiary.helpers.javascript_helper import escape_javascript class Preview(object): PREVIEW_TEMPLATE_PATH = os.path.dirname(os.path.abspath(__file__)) + '/../file_templates/preview.py' def __init__(self, **kwargs): self.options = kwargs...
54
25.91
112
16
307
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9fc69d18cb8488bb_bc7ddcbd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 47 ]
[ null ]
[ 25 ]
[ 50 ]
2024-11-19T00:40:24.523038+00:00
1,522,853,047,000
3f951c14b9d853dd8818a33f57e0227a6af6e21e
3
{ "blob_id": "3f951c14b9d853dd8818a33f57e0227a6af6e21e", "branch_name": "refs/heads/master", "committer_date": 1522853047000, "content_id": "92b94aa1e239e971fbed4e9641dec52708937404", "detected_licenses": [ "MIT" ], "directory_id": "00223e04d6e65dfac680ea501b5a2a4bdeefbaac", "extension": "py", "fi...
3.265625
stackv2
from time import sleep import paramiko class SSHException(Exception): def __init__(self, message): Exception.__init__(self, message) class SSHConnectionException(SSHException): pass class SSHCommandException(SSHException): pass class SSHSession(object): """ Generic SSHSession which c...
74
32.18
118
14
494
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2ead47383f4bbb45_d2706bc5", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 30 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-19T01:17:13.628671+00:00
1,553,138,577,000
ea54a6a9d8802f23c69eec44e0855a6552f451d0
3
{ "blob_id": "ea54a6a9d8802f23c69eec44e0855a6552f451d0", "branch_name": "refs/heads/master", "committer_date": 1553138577000, "content_id": "599c87860ca7e42454a90dcecf4981bfa535e74f", "detected_licenses": [ "MIT" ], "directory_id": "dc01f08dd5edc4f4bd9f8df2c936f53bf127d61e", "extension": "py", "fi...
3.3125
stackv2
#!/usr/bin/env python from threading import Thread import subprocess from queue import Queue import re num_ping_threads = 3 num_arp_threads = 3 in_queue = Queue() out_queue = Queue() ips = ["10.0.1.1", "10.0.1.3", "10.0.1.11", "10.0.1.51"] def pinger(i, iq, oq): """Pings subnet""" while True: ip = iq....
79
25.25
71
14
570
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_141d7a6df511773f_19eafcc7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 47 ]
[ null ]
[ 15 ]
[ 66 ]
2024-11-19T01:17:15.938126+00:00
1,688,155,818,000
e2f6c50ccc8ca85a6f985f6883987121327c3d88
2
{ "blob_id": "e2f6c50ccc8ca85a6f985f6883987121327c3d88", "branch_name": "refs/heads/main", "committer_date": 1688155818000, "content_id": "e0c72599a18bc0a389c2c83fa5f11e6d306c1922", "detected_licenses": [], "directory_id": "92de9e2a7ececfe2a92fd22b79b51e8efbcc7fe8", "extension": "py", "filename": "__mai...
2.4375
stackv2
#!/usr/bin/env python3 import argparse import random import sys import io import html import traceback from typing import Optional from textwrap import indent import requests import tweepy PETFINDER_TOKEN_URL = "https://api.petfinder.com/v2/oauth2/token" PETFINDER_API_URL = "https://api.petfinder.com/v2/animals" MAX_...
325
29
138
16
2,236
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ebc13d205d6469cb_e947e7a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](...
[ 321 ]
[ null ]
[ 15 ]
[ 26 ]
2024-11-19T01:17:21.204887+00:00
1,561,934,285,000
762db44b9f684aed80e669e60263c3d982503cf0
3
{ "blob_id": "762db44b9f684aed80e669e60263c3d982503cf0", "branch_name": "refs/heads/master", "committer_date": 1561934285000, "content_id": "9b6d923c7f3bbd1507210d002c4c6dee7c45652d", "detected_licenses": [ "MIT" ], "directory_id": "6794ea58852c37e36d22b72070a5513fba9a0c48", "extension": "py", "fi...
2.578125
stackv2
# Import expected headers we'll need from flask import Flask, render_template, request, json from flask_bootstrap import Bootstrap from flask import send_file import random from glob import glob import yaml from backend.search_engine import * from backend.language_processor import * from resources import * app = Fla...
116
35.61
110
20
906
python
[{"finding_id": "codeql_py/path-injection_4050ddf5d849f8d4_a9f17e6f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 63, 64, 85 ]
[ null, null, null ]
[ 19, 30, 19 ]
[ 28, 39, 28 ]
2024-11-19T01:17:31.775733+00:00
1,691,067,819,000
a87af924e92b25310b58ca2da9996c7b098cc437
3
{ "blob_id": "a87af924e92b25310b58ca2da9996c7b098cc437", "branch_name": "refs/heads/master", "committer_date": 1691067819000, "content_id": "0d7aaafa6475ca81188507eaacf3412c79bb9246", "detected_licenses": [ "CC0-1.0" ], "directory_id": "93fb177fc34a980cce0b83463507eeca2a39eebb", "extension": "py", ...
2.640625
stackv2
# Freely available under a CC0 license. Steve Baskauf 2019-05-25 # See https://www.wikidata.org/w/api.php for MediaWiki API help # For general information about MediaWiki tokens, see https://www.mediawiki.org/wiki/API:Tokens # Tor testing new API functions, use the Wikidata test instance sandbox: # https://test.wikidat...
136
38.69
132
12
1,379
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b3ce18c083577ce6_df62a84f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 111, 118, 122, 126, 133 ]
[ null, null, null, null, null ]
[ 24, 23, 26, 23, 31 ]
[ 35, 33, 30, 32, 35 ]
2024-11-19T01:17:43.793117+00:00
1,632,069,324,000
001bd532de81c4d3ba04ef20ae26ffd06d073166
2
{ "blob_id": "001bd532de81c4d3ba04ef20ae26ffd06d073166", "branch_name": "refs/heads/main", "committer_date": 1632069324000, "content_id": "508048ad6dccaebc3c9f4e4343cc2cb0fff4e54d", "detected_licenses": [ "MIT" ], "directory_id": "b6cdde2b805cd7dbda774c2d83225175c2d33560", "extension": "py", "file...
2.46875
stackv2
from flask import * import os import json app = Flask(__name__) @app.route("/") def home(): return render_template("home.html", stores=os.listdir("static/stores")) @app.route("/api/get_stores") def get_stores(): return os.listdir("static/stores") @app.route("/api/get_store_images/<store>") def get_store_...
32
24.03
117
12
189
python
[{"finding_id": "codeql_py/flask-debug_3fee65fe97f75647_e8bd8d64", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-022" ]
[ "py/flask-debug", "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 32, 20, 26 ]
[ null, null, null ]
[ 5, 12, 15 ]
[ 40, 55, 19 ]
2024-11-19T01:15:10.233335+00:00
1,606,237,286,000
2d95772f0f90d43a9c5a3c312a7fc160ea34b4b3
3
{ "blob_id": "2d95772f0f90d43a9c5a3c312a7fc160ea34b4b3", "branch_name": "refs/heads/main", "committer_date": 1606237286000, "content_id": "dd83314704d80a3deb11b9cc58ed3168df442946", "detected_licenses": [ "MIT" ], "directory_id": "bcaa8a838be45d30ea95c3c43004fcbbcc614073", "extension": "py", "file...
2.8125
stackv2
# settings.py from dotenv import load_dotenv import os import socket def get_env(): """" Gets environment variables form .env file """ try: load_dotenv(verbose=True) KEY = os.getenv("ADAFRUIT_IO_KEY") USERNAME = os.getenv("ADAFRUIT_IO_USERNAME") LATITUDE = os.getenv("L...
49
26.73
79
12
349
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6741486b13d47f6a_458180e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 41, 42, 43, 44, 45 ]
[ null, null, null, null, null ]
[ 11, 11, 11, 11, 11 ]
[ 34, 44, 44, 46, 46 ]
2024-11-19T01:15:21.381679+00:00
1,568,461,728,000
f097fd27729cc9c77afbf9114659bb88546e50af
2
{ "blob_id": "f097fd27729cc9c77afbf9114659bb88546e50af", "branch_name": "refs/heads/master", "committer_date": 1568461728000, "content_id": "1cd3c0ecb98f024c32fd509f11c682b38a3fd900", "detected_licenses": [ "MIT" ], "directory_id": "611b8ce35ed4b5eee93ad38ae1029ea3e32868f4", "extension": "py", "fi...
2.390625
stackv2
import re from django import http from django.contrib.auth import login from django.db import DatabaseError from django.shortcuts import render, redirect from django.urls import reverse from django.views import View from QQLoginTool.QQtool import OAuthQQ from django_redis import get_redis_connection from apps.oauth.m...
153
32.12
94
17
1,286
python
[{"finding_id": "codeql_py/url-redirection_2743e044212fcc91_53dee90c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 77, 146 ]
[ null, null ]
[ 33, 29 ]
[ 37, 33 ]
2024-11-19T01:15:22.355304+00:00
1,511,189,754,000
01471cd640e53a9710dc5ab6c361a5e5e0c4d4d1
3
{ "blob_id": "01471cd640e53a9710dc5ab6c361a5e5e0c4d4d1", "branch_name": "refs/heads/master", "committer_date": 1511189754000, "content_id": "230d08ccdfe9eca85f7ecc52c643885a2aa28fa6", "detected_licenses": [ "MIT" ], "directory_id": "9f7e2fe9d110e9d4b94fba76c792aaedf1b21237", "extension": "py", "fi...
2.90625
stackv2
""" Copyright (c) 2017 IS-Instruments Ltd Author: Josh Veitch-Michaelis Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, m...
385
27.91
97
16
2,507
python
[{"finding_id": "codeql_py/insecure-default-protocol_ba5aedcfcd295bea_db8434b2", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
2
true
[ "CWE-327", "CWE-200" ]
[ "py/insecure-default-protocol", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "'' binds a socket to all interfaces." ]
[ 110, 49 ]
[ null, null ]
[ 29, 5 ]
[ 50, 36 ]
2024-11-19T00:43:38.122572+00:00
1,624,950,844,000
f78f8ab9b5ad936eae9c3246ee3f774fa9c03b2b
2
{ "blob_id": "f78f8ab9b5ad936eae9c3246ee3f774fa9c03b2b", "branch_name": "refs/heads/main", "committer_date": 1624950844000, "content_id": "02f1fb3616fa211fdc641a535797962c2ed6ca30", "detected_licenses": [ "MIT" ], "directory_id": "5e8633c64d53c233dec190182980e0ae0c82c50c", "extension": "py", "file...
2.453125
stackv2
from django.shortcuts import render from rest_framework.views import APIView from rest_framework.response import Response from rest_framework import authentication, permissions from .serializers import ContestsSerializer from bs4 import BeautifulSoup from .decorators import user_exists from .utilities import check_user...
264
27.71
97
17
1,664
python
[{"finding_id": "codeql_py/partial-ssrf_e3848eab418e2bde_035e6c0d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
3
true
[ "CWE-918", "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 65, 126, 171 ]
[ null, null, null ]
[ 24, 24, 24 ]
[ 41, 41, 41 ]
2024-11-19T00:43:52.831592+00:00
1,382,780,953,000
b534c1c60059a45dc05b386f956388ecf8c6a837
2
{ "blob_id": "b534c1c60059a45dc05b386f956388ecf8c6a837", "branch_name": "refs/heads/master", "committer_date": 1382780953000, "content_id": "abd67c5142169d3e119f3f914fa47969682bf040", "detected_licenses": [ "BSD-2-Clause", "BSD-3-Clause" ], "directory_id": "85045953314a1cf340a6e954bd0763864f6ec78b...
2.46875
stackv2
#!/usr/bin/python import csv import os.path from collections import namedtuple import sn import os import sys,string import numpy as np import math import vcf valid_alleles = ['AA', 'AT', 'AG', 'AC', 'CA', 'CT', 'CG', 'CC', 'TA', 'TT', 'TG', 'TC', 'GA', 'GT', 'GG',...
166
20.75
143
17
1,065
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3190e77a8f835fed_98f4ecb8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive d...
[ 101, 158 ]
[ null, null ]
[ 18, 18 ]
[ 58, 58 ]
2024-11-19T01:31:58.935347+00:00
1,392,498,067,000
803ba670a1ccb3791147255fed03543fa58b0169
3
{ "blob_id": "803ba670a1ccb3791147255fed03543fa58b0169", "branch_name": "refs/heads/master", "committer_date": 1392498067000, "content_id": "e870836863c694eec948e52c683dc610dca137b5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c75e11159e92c1d88d8db3e51ef55b85d909ce3a", "extension": "p...
2.859375
stackv2
# encoding: utf-8 import os import sys from random import choice from string import lowercase import waliki TERM_ENCODING = getattr(sys.stdin, 'encoding', None) PROMPT_PREFIX = '> ' def create_dirs(): dirs = [waliki.CONTENT_DIR, waliki.CACHE_DIR] for d in dirs: if not os.path.exists(d): ...
169
30.54
80
21
1,234
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d11910f51b21afe1_b2d625a1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 140 ]
[ null ]
[ 17 ]
[ 24 ]
2024-11-19T01:44:04.413763+00:00
1,589,105,613,000
ba74d5c43dd2f5a1079dd20d47d4471992e0f00d
3
{ "blob_id": "ba74d5c43dd2f5a1079dd20d47d4471992e0f00d", "branch_name": "refs/heads/master", "committer_date": 1589105613000, "content_id": "603684b397a90d49c3f330b3d7ce03270d4834c3", "detected_licenses": [ "MIT" ], "directory_id": "7b872aeb25003499bdc14947f85729084f92667b", "extension": "py", "fi...
2.78125
stackv2
""" Author: Noah Thurston Date: 5/10/2020 Code written for the ECE523 final project. https://github.com/noahthurston/VAE-Password-Prediction Code reference: https://blog.keras.io/building-autoencoders-in-keras.html This was originally ran as a google colab notebook, so it will take some re-working to run natively ...
406
26.18
147
13
2,821
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc692828136ab9d9_94e4b9f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive...
[ 296, 316, 338, 378, 402 ]
[ null, null, null, null, null ]
[ 9, 9, 9, 7, 9 ]
[ 97, 97, 97, 31, 51 ]
2024-11-19T02:20:05.950544+00:00
1,540,291,980,000
3d98a3bcfb244a61b82dc3374ecd98ae7e7e6f7d
3
{ "blob_id": "3d98a3bcfb244a61b82dc3374ecd98ae7e7e6f7d", "branch_name": "refs/heads/master", "committer_date": 1540291980000, "content_id": "4b5aec08da69fd0af518459d10d7d4d9149e594a", "detected_licenses": [ "MIT" ], "directory_id": "622079460ebb4ba9b80f55624622e45fcbf064d1", "extension": "py", "fi...
2.828125
stackv2
#parser : 주어진 문서에서 원하는 내용만 추출 #parser 종류 :dome, 제이슨(가벼워서 웹에서 사용), #beautifulsope : 파워풀해서 많이 사용 import re emails = ['python@mail.example.com', 'python+kr@example.com', # 올바른 형식 'python-dojang@example.co.kr', 'python_10@example.info', # 올바른 형식 'python.dojang@e-xample.com', ...
24
22.71
106
8
209
python
[{"finding_id": "codeql_py/overly-large-range_54363d619348cf8b_eb344bcc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 14 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-19T00:59:30.814565+00:00
1,573,035,980,000
53795657e2b235b1dd0702b7605d5af2c9cce43d
3
{ "blob_id": "53795657e2b235b1dd0702b7605d5af2c9cce43d", "branch_name": "refs/heads/master", "committer_date": 1573035980000, "content_id": "6dc9b4cf75252175bc1acbce10866af1d3a91d8d", "detected_licenses": [ "MIT" ], "directory_id": "cac90e5c948fb9c022e3cb561be2517bfb481dc4", "extension": "py", "fi...
2.53125
stackv2
from flask import Flask from flask import request from glutemulo.kafka.producer import JsonKafka app = Flask(__name__) log = app.logger VENUES = ['v1', 'v2'] def process_data(source, data): log.info(source, data) productor = JsonKafka(bootstrap_servers="localhost:9092") productor.produce(source, dat...
32
21.41
64
12
189
python
[{"finding_id": "codeql_py/stack-trace-exposure_10600c4136853db6_e119e46d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/stack-trace-exposure", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 32, 16, 16, 26 ]
[ null, null, null, null ]
[ 16, 14, 22, 18 ]
[ 29, 20, 26, 64 ]
2024-11-19T00:59:34.656803+00:00
1,554,801,052,000
36c65f227f79f4b0ea8aea8971d1f85532d02aa8
3
{ "blob_id": "36c65f227f79f4b0ea8aea8971d1f85532d02aa8", "branch_name": "refs/heads/master", "committer_date": 1554801052000, "content_id": "69f3d59c455c2a13b796f430bbfeaacbe13a539b", "detected_licenses": [ "MIT" ], "directory_id": "df6cbc15edd7086926a21d42deb95956b6045f45", "extension": "py", "fi...
2.796875
stackv2
# -*- coding: utf-8 -*- # pylint: disable=line-too-long """ Created on Tue Mar 5 11:38:08 2019 Python script file with the functions to scrap Indeed Can be used alone with the code in the 'Main' cell Otherwise, get_data should be called from the main script file @authors: Radia, David, Martial, Maxence, Philippe B ...
470
30.92
179
25
3,600
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9245cf9cd6e4f04c_3d017d78", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 366 ]
[ null ]
[ 111 ]
[ 119 ]
2024-11-19T01:00:01.236620+00:00
1,692,130,575,000
ec00fc669201e2f9090a7d3e72b54c0ceb7ad46c
3
{ "blob_id": "ec00fc669201e2f9090a7d3e72b54c0ceb7ad46c", "branch_name": "refs/heads/master", "committer_date": 1692130575000, "content_id": "e87eee55938dd6b942ab48e3cb276f362e5238c5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0225a1fb4e8bfd022a992a751c9ae60722f9ca0d", "extension": "py"...
2.734375
stackv2
#!/usr/bin/env python3 """Parses GTFS feeds urls: https://transit.land/ - Transitland https://storage.googleapis.com/storage/v1/b/mdb-csv/o/sources.csv?alt=media - Mobility Database (https://mobilitydata.org/) Crawls all the urls, loads feed zips and extracts to the specified dire...
288
30.79
150
16
2,108
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a83ac3c745012ca8_f3d92cc3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive...
[ 151, 97, 102, 163 ]
[ null, null, null, null ]
[ 19, 26, 17, 21 ]
[ 35, 77, 103, 42 ]
2024-11-19T01:00:03.168772+00:00
1,576,308,711,000
d2e9024014855f57bf8dc2dcdfae0c9fd3489fa4
4
{ "blob_id": "d2e9024014855f57bf8dc2dcdfae0c9fd3489fa4", "branch_name": "refs/heads/master", "committer_date": 1576308711000, "content_id": "7363de4719f4d77dfc8c6db240bbf2a9369a55b9", "detected_licenses": [ "MIT" ], "directory_id": "e794dbb410f894b071327f5706bc3c3506f7a04b", "extension": "py", "fi...
3.5625
stackv2
''' PREDICTION ALGORITHM The algorithm follows the 'stupid back-off method', and make 5 suggestions as the next word. Suppose that we first start with quadgrams. 1. The function gets a string and tokenizes and preprocesses it. 2. It extracts the last 3 words of the string. 3. The function uses the quad-gram probabilit...
237
29.45
117
15
1,897
python
[{"finding_id": "codeql_py/overly-large-range_3cdc56491c8760b0_4376699e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 63, 66, 66 ]
[ null, null, null ]
[ 62, 34, 53 ]
[ 65, 37, 56 ]
2024-11-19T01:00:06.922073+00:00
1,573,271,670,000
8d3c4f4e7402819571522e48e2a31d6d27a080e4
2
{ "blob_id": "8d3c4f4e7402819571522e48e2a31d6d27a080e4", "branch_name": "refs/heads/master", "committer_date": 1573271670000, "content_id": "5a98ba476323e8c5d136afee8eb6423092b100bc", "detected_licenses": [ "MIT" ], "directory_id": "e64b762c4afd9c30944c91bc3ecd3c125adfa7e1", "extension": "py", "fi...
2.484375
stackv2
""" 检测raw_proxyhttp """ import asyncio import logging import sys import time from queue import Queue from threading import Thread import aiohttp from apscheduler.schedulers.background import BackgroundScheduler sys.path.append('../') sys.path.append('./') from Manager.ProxyManager import ProxyManager from Util.LogHan...
117
29.79
110
21
790
python
[{"finding_id": "codeql_py/request-without-cert-validation_b620f6e943abd81e_d1a4b218", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 53 ]
[ 56 ]
[ 32 ]
[ 45 ]
2024-11-19T01:11:44.574808+00:00
1,552,608,690,000
37510a3137030da28e2e7d779ff0927cd441426f
3
{ "blob_id": "37510a3137030da28e2e7d779ff0927cd441426f", "branch_name": "refs/heads/master", "committer_date": 1552608690000, "content_id": "85f113831ecdcee7be67272b37b2d60b2d62b657", "detected_licenses": [ "MIT" ], "directory_id": "0f45c137d3304e94ccd3027ebdb2eb5a5b50de89", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import requests, re, os, urllib2, argparse parser = argparse.ArgumentParser(description='Scraper script for Managers Tools. (https://www.manager-tools.com/)') group = parser.add_mutually_exclusive_group() parser.add_argument("-v", "--verbose", help="increase output verbos...
123
33.65
115
16
1,006
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_65ef4f50d510e914_939c524b", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'manager-tools.com/system/files/podc...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'manager-tools.com/system/files/podcast/mp3', so it might match more hosts than expected." ]
[ 111 ]
[ null ]
[ 33 ]
[ 97 ]
2024-11-19T01:11:52.702866+00:00
1,477,851,040,000
55b37a223ba3ecb3215edc455275ed85d07f79fd
2
{ "blob_id": "55b37a223ba3ecb3215edc455275ed85d07f79fd", "branch_name": "refs/heads/master", "committer_date": 1477851083000, "content_id": "d893e287b3dd742b39cfd6d68825fe3cbb5cf3b6", "detected_licenses": [ "MIT" ], "directory_id": "678e1a59d4d489bccb3e1a2ca0bbfcccbbba0db2", "extension": "py", "fi...
2.34375
stackv2
# all the imports from flask import Flask, \ abort, \ flash, \ g, \ redirect, \ render_template, \ request, \ send_from_directory, \ session, \ url_for from f...
155
29.48
84
17
1,029
python
[{"finding_id": "codeql_py/url-redirection_e681d0f079a7d4e8_1bd2f590", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
4
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 115, 118, 121, 125 ]
[ null, null, null, null ]
[ 29, 29, 29, 29 ]
[ 40, 40, 40, 40 ]
2024-11-19T02:10:27.256751+00:00
1,477,610,683,000
93416480c6871e272e8c7a2b0a0741f51f84e103
3
{ "blob_id": "93416480c6871e272e8c7a2b0a0741f51f84e103", "branch_name": "refs/heads/master", "committer_date": 1477610683000, "content_id": "e03ae7755ba0b5b69f6e4c528450ee33418835ce", "detected_licenses": [ "MIT" ], "directory_id": "7698b70f6216a35631d0dfa92385814ea7e31d8d", "extension": "py", "fi...
2.65625
stackv2
import os import sys import hashlib import json import requests import socket # import redis # from app import cache_client # # MAX_PAYLOAD_SIZE_BYTES = 1000*1000 # 1mb # MAX_CACHE_SIZE_BYTES = 300*1000*1000 #300mb # MAX_CACHE_DURATION = 60*60*24*7 # one week def http_get(url, headers={}, timeout=20, stream=False, ...
154
30.77
99
12
1,195
python
[{"finding_id": "codeql_py/request-without-cert-validation_f03d762687665a6c_775d693b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 34 ]
[ 39 ]
[ 13 ]
[ 39 ]
2024-11-19T02:10:28.312790+00:00
1,554,662,917,000
d7f9165254224c3d078949d79b37af2dd9eec18a
2
{ "blob_id": "d7f9165254224c3d078949d79b37af2dd9eec18a", "branch_name": "refs/heads/master", "committer_date": 1554662917000, "content_id": "db2edf62a677ce49ef27081499d9cdf58087b621", "detected_licenses": [ "MIT" ], "directory_id": "f4e722d3b6a0b4bc1fec7749338714954a05a014", "extension": "py", "fi...
2.46875
stackv2
import os import sys import argparse import time import datetime import re import string import json import csv import pickle from tweepy import API from tweepy import OAuthHandler from tweepy import Cursor from xvfbwrapper import Xvfb from selenium import webdriver from selenium.webdriver.common.keys import Keys fro...
363
34.21
104
22
2,529
python
[{"finding_id": "codeql_py/overly-large-range_da84eff3c56870ce_55ae586f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-U\\].", "remediation": "", "location": {...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-U\\].", "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-u\\].", "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-u\\]." ]
[ 339, 343, 343 ]
[ null, null, null ]
[ 39, 35, 48 ]
[ 42, 38, 51 ]
2024-11-19T02:45:17.763373+00:00
1,538,296,424,000
8421a1c9f1e1917303effa532e897b27b4880a6b
2
{ "blob_id": "8421a1c9f1e1917303effa532e897b27b4880a6b", "branch_name": "refs/heads/master", "committer_date": 1538296424000, "content_id": "54dc5a3b96063ca031b0175244fb3ec0b9ebe2ed", "detected_licenses": [ "MIT" ], "directory_id": "c2b56373ee37f971dcd8e2d260593066588605dc", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ This module handles the processes on CRAFT corpus """ from __future__ import (absolute_import, division, print_function, unicode_literals) from builtins import * import urllib.request import tarfile import os import re from lxml import etree f...
117
36.4
111
21
1,008
python
[{"finding_id": "codeql_py/tarslip_0ffd53ea953231c8_09c83813", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 68 ]
[ null ]
[ 36 ]
[ 55 ]
2024-11-19T02:45:29.231905+00:00
1,580,719,069,000
0e9f876b4e43126b3b7e7630336d1802022abecd
3
{ "blob_id": "0e9f876b4e43126b3b7e7630336d1802022abecd", "branch_name": "refs/heads/master", "committer_date": 1580719069000, "content_id": "9ab5a722a589ead281b307498ccba237875c42e0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8223f6d4442106e74fb12bc1006277598e5399e6", "extension": "py"...
2.5625
stackv2
# ㄹㅇ 생각없이 만든 히요비 api ㅋㅋㅋㅋㅋㅋㅋㅋㅋㅋㅋㅋ # 진짜 왜 만든거지 ㅋㅋㅋ from flask import Flask, jsonify, request from requests.adapters import HTTPAdapter from requests import Session, exceptions from urllib.parse import urlparse from queue import Queue from threading import Thread from bs4 import BeautifulSoup class _Enable_SNI_Adapte...
166
23.37
118
15
1,086
python
[{"finding_id": "codeql_py/partial-ssrf_07551f716e1ef670_85ef4e2f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 84 ]
[ null ]
[ 23 ]
[ 55 ]
2024-11-19T02:45:35.130393+00:00
1,472,747,010,000
946919fc36f1ce96c20746c0e56ace4f997980c6
2
{ "blob_id": "946919fc36f1ce96c20746c0e56ace4f997980c6", "branch_name": "refs/heads/master", "committer_date": 1472747010000, "content_id": "8fe469551cfff740cbb116aea473022c221c4021", "detected_licenses": [ "MIT" ], "directory_id": "7e6a06489d752f84c0355bcc1f20205b70765804", "extension": "py", "fi...
2.40625
stackv2
#import SimpleHTTPServer #import SocketServer #!/usr/bin/env python from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer import ssl import argparse import cgi import os import time import json import argparse from urlparse import urlparse, parse_qs from Judge import rank debug=True class RapJudgeServer(Base...
119
28.45
112
19
943
python
[{"finding_id": "codeql_py/insecure-default-protocol_6993c75461867699_fd8130e8", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 91 ]
[ null ]
[ 16 ]
[ 112 ]
2024-11-19T02:45:44.025209+00:00
1,581,386,304,000
ac03577af264d060f0eae9a715e528f6fd1b9fc6
2
{ "blob_id": "ac03577af264d060f0eae9a715e528f6fd1b9fc6", "branch_name": "refs/heads/master", "committer_date": 1581386304000, "content_id": "9afded965c6208a900450da898c2ecc582275cc3", "detected_licenses": [ "MIT" ], "directory_id": "2bdb6c8f10962c778814ee2a9dd7b0cab4eeb1c5", "extension": "py", "fi...
2.390625
stackv2
from flask import Response, request, jsonify from src import app, db, debug from src.api.models.task import Task from datetime import datetime import json, os class TaskView: @app.route('/api/tasks', methods=['GET']) def index(): response = {'data': []} tasks = Task.query.all() for task in...
143
25.27
92
18
974
python
[{"finding_id": "codeql_py/stack-trace-exposure_8703b4babcaea8c6_23b5062b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 63, 91, 116, 141 ]
[ null, null, null, null ]
[ 20, 20, 20, 20 ]
[ 40, 40, 40, 40 ]
2024-11-19T02:45:45.067073+00:00
1,599,281,736,000
8996cad1ac8f59d85da42fa97ddc07edc83864c8
2
{ "blob_id": "8996cad1ac8f59d85da42fa97ddc07edc83864c8", "branch_name": "refs/heads/master", "committer_date": 1599281736000, "content_id": "a6c08a1a09d16e9a874a03ba4a4fd888e2178257", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b4d0369246d024a2e2a364b019a2e2f818451c74", "extension": "py"...
2.40625
stackv2
# -*- coding: utf-8 -*- # flask + vue + web for animation from flask import Flask, jsonify, render_template from flask_cors import CORS from flask import session from flask import redirect from flask import url_for from flask import abort from flask import request # auth decorator support from functools import wraps i...
273
24.18
121
17
1,904
python
[{"finding_id": "codeql_py/stack-trace-exposure_fceedad6c9dacfed_08c9fe45", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/stack-trace-exposure", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 264, 59, 74, 240 ]
[ null, null, null, null ]
[ 20, 18, 26, 18 ]
[ 21, 46, 43, 48 ]
2024-11-19T02:45:49.353517+00:00
1,475,611,382,000
02367a824a5d1b77bbcd8225408c207ada24a65e
3
{ "blob_id": "02367a824a5d1b77bbcd8225408c207ada24a65e", "branch_name": "refs/heads/master", "committer_date": 1475611382000, "content_id": "790d3dcf0c2c3850b605f2b50d45d01b72f40000", "detected_licenses": [ "MIT" ], "directory_id": "5dc7a3116af526e40722d1b8eac04b1896fc7f68", "extension": "py", "fi...
2.515625
stackv2
from http.server import HTTPServer, BaseHTTPRequestHandler from socketserver import ThreadingMixIn from .redirect import RedirectHandler import threading import ssl __all__ = ['ThreadedServer', 'SecureServer'] class ThreadedServer(ThreadingMixIn, HTTPServer): protocol_version = 'HTTP/1.1' def __init__(self,...
65
33.77
78
14
439
python
[{"finding_id": "codeql_py/insecure-default-protocol_a106acc01eb30317_1a306862", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 48 ]
[ 52 ]
[ 23 ]
[ 69 ]
2024-11-19T02:57:10.796564+00:00
1,573,173,767,000
46631303c88f24f42685f46dafdfe61161bf2e4a
3
{ "blob_id": "46631303c88f24f42685f46dafdfe61161bf2e4a", "branch_name": "refs/heads/master", "committer_date": 1573173767000, "content_id": "67f699a0b08ea0a907ae69ff03f80dadf5c7eab7", "detected_licenses": [ "MIT" ], "directory_id": "9adc6d67ef98dd86fa458957b4fc48f78fa09553", "extension": "py", "fi...
3.015625
stackv2
"""Build command for Ginpar projects. This module implements the building command for the ginpar static content generator. ``build`` will read the configuration file in search for ``build_path`` and ``source_path``. If not defined, `build` will use ``"public"`` and ``"sketches"``, respectively. Examples -------- To...
381
26.18
96
18
2,419
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0ccd53af9488d33f_7d50089d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 341 ]
[ null ]
[ 18 ]
[ 89 ]
2024-11-19T02:57:23.293962+00:00
1,588,871,531,000
25e6f0f0ce8c884f36c1c92c7308a3b14cf814af
2
{ "blob_id": "25e6f0f0ce8c884f36c1c92c7308a3b14cf814af", "branch_name": "refs/heads/master", "committer_date": 1588871531000, "content_id": "b1c6e892fc69aa60d774f38930a454a6aa0b6bfd", "detected_licenses": [ "MIT" ], "directory_id": "04e7c08a60bbd36261da37ae13d27fbe9c71de8a", "extension": "py", "fi...
2.5
stackv2
from config import * import flask from flask import send_file from flask import Flask, url_for, jsonify, request, redirect import json import os import os.path import base64 import re from csv import DictWriter import time from os.path import abspath, dirname, exists, isfile, join, splitext import config current_time...
68
26.4
75
12
469
python
[{"finding_id": "codeql_py/flask-debug_73fbaf4eca4e8cb8_e48a886a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 66, 35 ]
[ null, null ]
[ 9, 21 ]
[ 28, 24 ]
2024-11-19T03:12:12.438630+00:00
1,603,731,118,000
1c258ceb73c88e83ed78cae0241e27dd021f2407
2
{ "blob_id": "1c258ceb73c88e83ed78cae0241e27dd021f2407", "branch_name": "refs/heads/master", "committer_date": 1603731118000, "content_id": "43798b59d5ee2cb7e16ef3ef098a2c8dd7350c01", "detected_licenses": [ "MIT" ], "directory_id": "1cbf232261ba470deffa542d26dccb129be74492", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 # script to forward MQTT data to and InfluxDB database import paho.mqtt.client as mqtt from influxdb import InfluxDBClient import time, datetime import json import os # define constants MQTT_SERVER = ('mqtt', 1883) # ip, port MQTT_USERNAME = os.getenv('MQTT_USERNAME', 'mqtt') MQTT_PASSWORD = os...
173
32.14
126
18
1,323
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_adce112714164800_e8b9d41e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 144 ]
[ null ]
[ 30 ]
[ 43 ]
2024-11-19T03:12:23.009373+00:00
1,679,573,658,000
ae32bbea538e944441562f52843575d426451d96
3
{ "blob_id": "ae32bbea538e944441562f52843575d426451d96", "branch_name": "refs/heads/master", "committer_date": 1679573658000, "content_id": "6660577b301a158dcfd5c0c25462528810468d60", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1e6871bc3bc87b67b1a18a0c69f17d901e1a1a7f", "extension": "py"...
2.875
stackv2
"""Schedule analyses for golang packages..""" from bs4 import BeautifulSoup import requests from .base import AnalysesBaseHandler class GolangPopularAnalyses(AnalysesBaseHandler): """Schedule analyses for golang packages.""" # API documentation: http://go-search.org/infoapi _URL = 'http://go-search.org/...
105
40.15
100
21
833
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_494a176b54a2f2d1_62f100de", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 15 ]
[ null ]
[ 12 ]
[ 44 ]
2024-11-19T01:33:39.349420+00:00
1,624,638,597,000
5cd8e6fbaf65e3349d4d94736830786510db4b80
2
{ "blob_id": "5cd8e6fbaf65e3349d4d94736830786510db4b80", "branch_name": "refs/heads/main", "committer_date": 1624638597000, "content_id": "025afd1156151d1a66ba820e9c8684070dfda482", "detected_licenses": [ "Apache-2.0" ], "directory_id": "199ec10e08c21509a848f4565b32d51a2c9c593f", "extension": "py", ...
2.359375
stackv2
import time import requests import m3u8 from Crypto.Cipher import AES import os from datetime import datetime import threading import shutil import urllib3 thread_num = 600 # 线程数量 # todo 注意是否已关闭了verify验证 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) class temp_file: def __init__(self, ...
221
33.29
120
23
2,367
python
[{"finding_id": "codeql_py/request-without-cert-validation_df1eac6e804da520_5a9ea593", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 94 ]
[ 95 ]
[ 18 ]
[ 60 ]
2024-11-19T01:33:46.148502+00:00
1,592,131,136,000
b0cfcde56b0b44dd91df962c257932405c2e561d
2
{ "blob_id": "b0cfcde56b0b44dd91df962c257932405c2e561d", "branch_name": "refs/heads/master", "committer_date": 1592131136000, "content_id": "0e5a4e91be284adb74b179e689c2963ad5c50e52", "detected_licenses": [ "MIT" ], "directory_id": "055b2e4dce5e6ac4986c7071dafb0d0badc33bc2", "extension": "py", "fi...
2.421875
stackv2
from flask import Blueprint, Response, request, jsonify from components.drivers.sensors.GPSSensor import GPSSensor gps = None gps_api = Blueprint('gps_api', __name__) @gps_api.route("/gps", methods=['GET']) def gps_value_request(): gps_data = gps.get_data() if gps_data and gps_data.latitude: gps_jso...
29
29.55
73
13
200
python
[{"finding_id": "codeql_py/reflective-xss_e9d4e5bfa644a8d5_f9e498a6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 29 ]
[ null ]
[ 21 ]
[ 33 ]
2024-11-19T02:11:01.176400+00:00
1,407,565,843,000
ea1dfcd28f2b906cc3d3b60de73e378155f7a356
2
{ "blob_id": "ea1dfcd28f2b906cc3d3b60de73e378155f7a356", "branch_name": "refs/heads/master", "committer_date": 1407565843000, "content_id": "374e21e56a67118a4059269dcdf1eb00a900475b", "detected_licenses": [ "MIT" ], "directory_id": "4bcd38cf1d93839c83a64062b6b484f3b97fa061", "extension": "py", "fi...
2.484375
stackv2
import ConfigParser import boto import time import tarfile import os import sys from boto.s3.connection import S3Connection class S3ArchiveHandler: def __init__(self, config_path): config = ConfigParser.ConfigParser() config.read(config_path + "/s3-access.conf") s3_access = config.get("mai...
164
32.45
98
19
1,279
python
[{"finding_id": "codeql_py/tarslip_2fce5f3f250b1f43_ea827a89", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 109 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T02:11:36.116875+00:00
1,548,919,975,000
57bcf02d846e3dab63131e8c461fd041124b8f07
2
{ "blob_id": "57bcf02d846e3dab63131e8c461fd041124b8f07", "branch_name": "refs/heads/master", "committer_date": 1548919975000, "content_id": "17d7e90841de2019512844bcd8fe51b6df162f35", "detected_licenses": [ "Unlicense" ], "directory_id": "3fe3499688ad9f709f163cb0144fb7a65f69a7a2", "extension": "py",...
2.5
stackv2
import os import logging from datetime import datetime, timedelta from flask import Flask, request, abort, jsonify , render_template import requests def temp_token(): import binascii temp_token = binascii.hexlify(os.urandom(24)) return temp_token.decode('utf-8') logFormatter = logging.Formatter("%(asctime...
78
33.85
129
19
653
python
[{"finding_id": "codeql_py/log-injection_21698e923f5d5923_c30a981b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 52 ]
[ null ]
[ 21 ]
[ 74 ]
2024-11-19T02:32:51.179767+00:00
1,547,475,371,000
47888e5f0a59b0339d82880838268bbf43ae3742
3
{ "blob_id": "47888e5f0a59b0339d82880838268bbf43ae3742", "branch_name": "refs/heads/master", "committer_date": 1547475371000, "content_id": "9ca8d50773ef4b9cfab4863500ec147ec05c3d41", "detected_licenses": [ "MIT" ], "directory_id": "e390c112f76ddf2f6ac42363a4288140eb339911", "extension": "py", "fi...
2.515625
stackv2
import time, os.path, subprocess, re, multiprocessing, threading, json, shutil from selenium import webdriver from selenium.common.exceptions import TimeoutException from selenium.webdriver.support import expected_conditions as EC from selenium.webdriver.support.ui import WebDriverWait from . import manifest class R...
442
28.55
111
18
3,609
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_041faf01852aca65_4447e9d2", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [kink.com](1) may be at an arbitrary position in the sa...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [kink.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 269 ]
[ null ]
[ 6 ]
[ 23 ]
2024-11-19T02:32:59.337103+00:00
1,558,881,619,000
477c119aa02afeddd8266744f1bac2dcd9dfa43c
2
{ "blob_id": "477c119aa02afeddd8266744f1bac2dcd9dfa43c", "branch_name": "refs/heads/master", "committer_date": 1558881619000, "content_id": "27ac29f7af8264b2bafb1420294900fd69d33a68", "detected_licenses": [ "MIT" ], "directory_id": "331cdb3304e92aeafe498b15f7c4bfb91a6c546e", "extension": "py", "fi...
2.421875
stackv2
import re from QQLoginTool.QQtool import OAuthQQ from django import http from django.conf import settings from django.contrib.auth import login from django.db import DatabaseError from django.shortcuts import render, redirect from django.urls import reverse from carts.utils import merge_cart_cookie_to_redis from oauth...
172
36.16
97
19
1,687
python
[{"finding_id": "codeql_py/url-redirection_3e72f0942b307ab5_53361cde", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 72, 144 ]
[ null, null ]
[ 37, 37 ]
[ 41, 41 ]
2024-11-19T02:33:27.852790+00:00
1,565,090,854,000
43af6e9a7c3ea51ae1773b23b30662248483ff39
2
{ "blob_id": "43af6e9a7c3ea51ae1773b23b30662248483ff39", "branch_name": "refs/heads/master", "committer_date": 1565090854000, "content_id": "792e6fd4eb9cd4a69629a974acc6ac2f6bfebb65", "detected_licenses": [ "MIT" ], "directory_id": "15e2c7b30aa72891d6971b911059c3ca62f5a64c", "extension": "py", "fi...
2.390625
stackv2
#coding:utf-8 import socket,sys import pymssql def mssqlburp(ip,port): addr = (ip,int(port)) with open('mssql\user.txt') as user: users = user.readlines() user.close() with open('mssql\pass.txt') as passs: passwords = passs.readlines() passs.close() sock_1433 = socket.socke...
34
25.24
103
18
227
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_557cf58c81775cc9_de95eff3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 30 ]
[ null ]
[ 38 ]
[ 103 ]
2024-11-19T02:59:06.967894+00:00
1,630,495,057,000
01c1c06c44b3cd570c5bab0d4d11d6d17e8c020a
3
{ "blob_id": "01c1c06c44b3cd570c5bab0d4d11d6d17e8c020a", "branch_name": "refs/heads/main", "committer_date": 1630495057000, "content_id": "eccd6b6f8e256e33481451288f8139f4ea11871c", "detected_licenses": [ "MIT" ], "directory_id": "c74e42ab4f52850aa56dd3728729fb47a844bb7e", "extension": "py", "file...
3.015625
stackv2
from jinja2 import Template, StrictUndefined import os def write_template(file_name, **variables): with open(file_name, "r", encoding="utf-8") as file: template = Template(file.read(), undefined=StrictUndefined) out = template.render(**variables) with open(f"out_int/{file_name}", "w+", encoding="...
79
30.25
92
22
576
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4136596c92fcef46_82be41e6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 7 ]
[ null ]
[ 20 ]
[ 68 ]
2024-11-19T02:59:57.801240+00:00
1,659,153,197,000
73f3b4e7d43d4784099c9d06331c5db67d60aee1
3
{ "blob_id": "73f3b4e7d43d4784099c9d06331c5db67d60aee1", "branch_name": "refs/heads/master", "committer_date": 1659153197000, "content_id": "2a1fb6002af1c0ea706008b31b39a076d2095769", "detected_licenses": [ "MIT" ], "directory_id": "636787168e151db48093e939a34ddd211c94c263", "extension": "py", "fi...
3.359375
stackv2
import csv import sys import time from pathlib import Path try: import win32com.client as comctl except ImportError: print("please: pip install pywin32") sys.exit(1) csv_content = """account,name,salary 0000123, Tom, 10000 0000456, Marry, 15000 0000789, Jack, 20000 """ def create_dummy_salary(): csv...
57
23.75
68
12
386
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_57b77e86ce55f9c9_8906c1bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 55 ]
[ null ]
[ 21 ]
[ 30 ]
2024-11-19T03:12:15.011210+00:00
1,528,407,209,000
68007b3074d39989ccc0684317ce300ec7a65c02
3
{ "blob_id": "68007b3074d39989ccc0684317ce300ec7a65c02", "branch_name": "refs/heads/master", "committer_date": 1528407209000, "content_id": "3ab939ec2aeffc30bdadb4d015ff7f6a55c00f12", "detected_licenses": [ "MIT" ], "directory_id": "85aacb540e049b3cd6c1364ea3b7e30011ad1888", "extension": "py", "fi...
2.65625
stackv2
from flask import Flask, render_template, request import sqlite3 as sql app = Flask(__name__) import sqlite3 conn = sqlite3.connect('database.db') # print("Opened database successfully") #conn.execute('CREATE TABLE xy (name TEXT, grade TEXT, room TEXT, tel TEXT, picture TEXT, keyword TEXT)') #print("Table created su...
99
22.76
136
14
529
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08b092a02a0ffb48_af3bf460", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 50, 89 ]
[ null, null ]
[ 14, 4 ]
[ 24, 25 ]
2024-11-19T03:24:43.271470+00:00
1,546,689,469,000
69a067fbf42a8cac2762aef673178005e9f6a48b
3
{ "blob_id": "69a067fbf42a8cac2762aef673178005e9f6a48b", "branch_name": "refs/heads/master", "committer_date": 1546689469000, "content_id": "f646dc2afe199fe6974130f26066974afe7c3c0e", "detected_licenses": [ "Unlicense" ], "directory_id": "90532f95137f050976de59426898310492de7d08", "extension": "py",...
3.265625
stackv2
''' Task A. ''' # task to do the following: # parse the sample_bba_data_2017 excel sheet or csv document # to obtain data in the following format as JSON # # primary structure (master model) # [use the structure cited beneath as a reference] ''' Student { name: String, gender: Enum(String) ['male' | 'female...
85
24.08
92
12
562
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_89b3716931413b97_72ebfeae", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]...
[ 83 ]
[ null ]
[ 7 ]
[ 26 ]
2024-11-19T03:35:17.837929+00:00
1,559,196,599,000
b60fd6134a5df813cf8b7ac165f208a7ca0d0af6
3
{ "blob_id": "b60fd6134a5df813cf8b7ac165f208a7ca0d0af6", "branch_name": "refs/heads/master", "committer_date": 1559196599000, "content_id": "3f1e5d6ad4dcda716a4b2f77533cf27e0b6e2921", "detected_licenses": [ "MIT" ], "directory_id": "d1aebc841bf4a0b197bf2af70cce1530182b279f", "extension": "py", "fi...
2.6875
stackv2
from flask import Flask,request,jsonify,json # import pymysql import base64 import string import random import datetime import pandas as pd from collections import Counter app=Flask(__name__) request_count=0 @app.route('/api/v1/_count',methods=['GET','DELETE']) def get_count(): global request_count if(request.me...
210
20.75
89
18
1,219
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b7e5f09f7d2a9349_5ce5113b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "A Flask app appears to be r...
[ 70, 118, 133, 133, 210 ]
[ null, null, null, null, null ]
[ 17, 17, 9, 39, null ]
[ 25, 25, 38, 47, 45 ]
2024-11-19T03:35:18.437763+00:00
1,610,642,762,000
fe178407b5c3acff231235bcb4e35263829ce6aa
3
{ "blob_id": "fe178407b5c3acff231235bcb4e35263829ce6aa", "branch_name": "refs/heads/master", "committer_date": 1610642762000, "content_id": "8a42db0e19c30277b14127600fd1317da65238b7", "detected_licenses": [ "MIT" ], "directory_id": "d0e9590dea3536fc4e5c20899caa6363c7b37a0e", "extension": "py", "fi...
3.09375
stackv2
import random from time import sleep import csv import threading ex = 1 #print("These are how many charecters the generater can chose from." + " " + str(26 + 26 +10 + 24 + 24 + 25)) password_alphabet = [ "a" , "b" , "c" , "d" , "e" , "f" , "g" , "h" , "j" , "k" , "l" , "m" , "n" , "o" , "p" ...
159
38.98
146
18
1,713
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fe2621b4e485fccd_1a0e8104", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensiti...
[ 80, 52, 65 ]
[ null, null, null ]
[ 24, 19, 11 ]
[ 42, 129, 29 ]
2024-11-19T01:27:04.991270+00:00
1,505,002,971,000
9cb5eb74bf71a5c3a5d1ba493ec09878d9a834b7
3
{ "blob_id": "9cb5eb74bf71a5c3a5d1ba493ec09878d9a834b7", "branch_name": "refs/heads/master", "committer_date": 1505002971000, "content_id": "ab86b5f9e3a5027dc6273537a88c57c95bd2700e", "detected_licenses": [ "MIT" ], "directory_id": "254942f912ae11a79a967e14b3ed8eef0c59abcc", "extension": "py", "fi...
2.53125
stackv2
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler from SocketServer import ThreadingMixIn import threading import cgi import json from distutils.util import strtobool from main import * class Handler(BaseHTTPRequestHandler): def do_GET(self): rootdir = '/Users/Alex/Desktop/HackCMU217' #fi...
95
32.91
124
16
744
python
[{"finding_id": "codeql_py/path-injection_ee053f7c0e240ada_532de1af", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 20 ]
[ null ]
[ 26 ]
[ 45 ]
2024-11-19T01:27:05.455437+00:00
1,529,231,164,000
89583bd8601072e1a7b2b1f889e79c59bc5c0392
2
{ "blob_id": "89583bd8601072e1a7b2b1f889e79c59bc5c0392", "branch_name": "refs/heads/master", "committer_date": 1529231178000, "content_id": "2c46cc7e382075486ae58e70991b3d78be1d89c5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "62bea969deae2bd1c434d7e4de695832e65e8079", "extension": "p...
2.4375
stackv2
# -*- coding: utf-8 -*- import requests import hashlib from cryptotik.common import headers from cryptotik.exceptions import APIError class OKcoin: url = 'https://www.okcoin.$/api/v1/' # OKcoin cny and usd markets do no use the same domain delimiter = "_" headers = headers taker_fee, maker_fee = 0, 0...
273
35.37
117
22
2,240
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_47793509a95fbe1d_9458dd31", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 98 ]
[ null ]
[ 28 ]
[ 47 ]
2024-11-19T01:38:10.125177+00:00
1,675,913,800,000
1ee869e507a4494ec06bf1c4e9ea3f53c80fac5e
2
{ "blob_id": "1ee869e507a4494ec06bf1c4e9ea3f53c80fac5e", "branch_name": "refs/heads/main", "committer_date": 1675913800000, "content_id": "6525a0003a322bf600bc21e5f4b8112e01e2c9a2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e411731a8c602ebb77c3d1f1e34f6d144d122cac", "extension": "py", ...
2.5
stackv2
#!/usr/bin/env python import argparse import filecmp import json import os import re import subprocess import sys import requests here = os.path.abspath(os.path.dirname(__file__)) def run_cellml_model(executable, model_file): return_code = subprocess.call(f"{executable} {model_file}", shell=True) return re...
153
29.56
108
20
1,094
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_87913b54ae539f8b_4ed6bb4a", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'physiomeproject.org/e/', so it migh...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'physiomeproject.org/e/', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'physiomeproject.org/exposure/', so it might match more hosts than expected." ]
[ 22, 23 ]
[ null, null ]
[ 24, 24 ]
[ 67, 74 ]
2024-11-19T01:38:11.739559+00:00
1,633,130,097,000
645f0d67712f07900d722e52f0d92237016dfd3d
3
{ "blob_id": "645f0d67712f07900d722e52f0d92237016dfd3d", "branch_name": "refs/heads/master", "committer_date": 1633130097000, "content_id": "ae75b1cc4149fbd398f2b09f24be8419842dbf54", "detected_licenses": [ "MIT" ], "directory_id": "f956dcba2e6781957d64d88a0b558c65983771f0", "extension": "py", "fi...
2.65625
stackv2
from flask import Flask, Response, request from werkzeug.utils import secure_filename import json import subprocess import os app = Flask(__name__) @app.route('/listen/<book_name>') def sendmp3(book_name): with open('library.json') as library_fp: library = json.loads(library_fp.read()) if book_na...
59
30.47
102
13
444
python
[{"finding_id": "codeql_py/reflective-xss_c5739c7667a7cd23_d89057a3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 15 ]
[ null ]
[ 16 ]
[ 73 ]
2024-11-19T01:38:32.877694+00:00
1,602,499,533,000
2e41364ebd09d2ad58a3ae72d1f8b8f502be16f3
3
{ "blob_id": "2e41364ebd09d2ad58a3ae72d1f8b8f502be16f3", "branch_name": "refs/heads/master", "committer_date": 1602499533000, "content_id": "b5503d3131bd93e7d1b02e7a138a7cf51947be29", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f946d146d9b487ab1edeaad10bf6b3a17cd549f0", "extension": "py"...
2.515625
stackv2
""" SYNOPSIS: Script to discover devices managed by OM Enterprise DESCRIPTION: This script exercises the OME REST API to discover devices. For authentication X-Auth is used over Basic Authentication. Note that the credentials entered are not stored to disk. EXAMPLE: python discover_device.py --ip <ip ad...
317
42.97
138
18
3,080
python
[{"finding_id": "codeql_py/request-without-cert-validation_b60690f8706d78c7_5db595f6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 34, 138, 146, 187, 203, 217 ]
[ 36, 139, null, null, null, 219 ]
[ 20, 21, 16, 20, 33, 25 ]
[ 50, 83, 64, 72, 90, 51 ]
2024-11-19T01:38:47.590219+00:00
1,588,727,985,000
a27c4b3ac091088a5eee9ccee8baa358dfffd1f8
3
{ "blob_id": "a27c4b3ac091088a5eee9ccee8baa358dfffd1f8", "branch_name": "refs/heads/master", "committer_date": 1588727985000, "content_id": "92daede42cb7566d560a2000b293eed00aa12123", "detected_licenses": [ "MIT" ], "directory_id": "4bc6486ecba91e72615ee7159d208ec84c219556", "extension": "py", "fi...
2.84375
stackv2
#!/usr/bin/env python3 import sys import os import requests import re import csv USER_AGENT = 'wgetcomment 1.0' def analyze_comment(comment): symbol_count = 0; for c in comment: if (ord(c) > 0x20 and ord(c) < 0x30) or (ord(c) > 0x39 and ord(c) < 0x41) or (ord(c) > 0x5A and ord(c) < 0x61) or (ord(c) > 0x7A and...
90
29.69
152
18
794
python
[{"finding_id": "codeql_py/bad-tag-filter_84d82396ae3a9a06_62657be5", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match upper case <SCRIPT> tags." ]
[ 75 ]
[ null ]
[ 27 ]
[ 54 ]
2024-11-19T01:52:03.291146+00:00
1,585,792,047,000
d63b953643514eefc4f559bc946c614a7a47916a
3
{ "blob_id": "d63b953643514eefc4f559bc946c614a7a47916a", "branch_name": "refs/heads/master", "committer_date": 1585792047000, "content_id": "4ebac0c1ff92051892333b1129437fb55a50abdb", "detected_licenses": [ "MIT" ], "directory_id": "eff5edbaeb0e7808ea58d080491e558ca62ab842", "extension": "py", "fi...
2.640625
stackv2
import os import sys import hashlib from flask import Flask, render_template, redirect from lib.codenames import KeyCard, NameCards sys.path.insert(0, os.path.dirname(__file__)) app = Flask(__name__) data = {} @app.route('/') def index(): return render_template('home.html') @app.route('/keycard') def keyc...
78
24.83
69
15
553
python
[{"finding_id": "codeql_py/flask-debug_d43f760c76438997_e492a866", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 78, 54 ]
[ null, null ]
[ 5, 21 ]
[ 24, 69 ]
2024-11-19T01:52:26.521575+00:00
1,617,265,826,000
18df1d62ac2745ae2221d9db3e24672de8df32a7
3
{ "blob_id": "18df1d62ac2745ae2221d9db3e24672de8df32a7", "branch_name": "refs/heads/main", "committer_date": 1617265826000, "content_id": "db39e1a47256aae38e40c9bdebae8921309f859a", "detected_licenses": [ "MIT" ], "directory_id": "d18abd71a7867eb40c5227e96295059ef14a78b2", "extension": "py", "file...
2.671875
stackv2
# coding: utf-8 import os import time import signal import random import logging import argparse import requests import threading from flask import Flask, request, jsonify from werkzeug.routing import BaseConverter logging.basicConfig(filename='log/mlapp.log',level=logging.INFO, filemode='a', format='%(created)f::ML...
380
30.68
146
20
2,722
python
[{"finding_id": "codeql_py/log-injection_fc20d3adb6500862_14880a3b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
11
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depen...
[ 263, 265, 267, 275, 280, 298, 300, 334, 337, 345, 349 ]
[ null, null, null, null, null, null, null, null, null, null, null ]
[ 52, 63, 57, 39, 64, 67, 57, 54, 55, 39, 64 ]
[ 55, 66, 64, 42, 67, 70, 64, 71, 62, 42, 67 ]
2024-11-19T02:28:04.776127+00:00
1,435,580,900,000
a1c72e58692e45fed95aae00851be5eb79e56937
2
{ "blob_id": "a1c72e58692e45fed95aae00851be5eb79e56937", "branch_name": "refs/heads/master", "committer_date": 1435580900000, "content_id": "530d753181ab1723a0b8de24628743fd53e44152", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "48894ae68f0234e263d325470178d67ab313c73e", "extension": "p...
2.46875
stackv2
# -*- coding: utf-8 -*- ##---------------------------------------------------------------------- ## TCPSocket implementation ##---------------------------------------------------------------------- ## Copyright (C) 2007-2011 The NOC Project ## See LICENSE for details ##--------------------------------------------------...
46
38.59
86
20
363
python
[{"finding_id": "codeql_py/insecure-protocol_f48125b087498a49_56f4a8bf", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1)." ]
[ 22 ]
[ 25 ]
[ 18 ]
[ 65 ]
2024-11-19T02:28:15.653518+00:00
1,540,706,385,000
07bfda873d97371e63bb3f9b2997c4934a6011b7
2
{ "blob_id": "07bfda873d97371e63bb3f9b2997c4934a6011b7", "branch_name": "refs/heads/master", "committer_date": 1540706385000, "content_id": "dd86335ddf2f0b82fbff58066ebfb16f60d05e85", "detected_licenses": [ "MIT" ], "directory_id": "81e98e6064b16f047983d1f7c1645b95a423949c", "extension": "py", "fi...
2.453125
stackv2
import json, requests, sys import os import youtube_dl from flask import Flask, render_template, json, request, send_file,request import urllib from bs4 import BeautifulSoup import datetime import re year = datetime.date.today().year # Flask app should start in global layout app = Flask(__name__) def make_savepath(t...
73
31.22
93
19
637
python
[{"finding_id": "codeql_py/stack-trace-exposure_57f1fdb29225cb04_889368ac", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-918" ]
[ "py/stack-trace-exposure", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 67, 28 ]
[ null, null ]
[ 11, 10 ]
[ 17, 72 ]
2024-11-19T02:28:30.339334+00:00
1,388,053,999,000
de6cfa46a8049f6f9506889bd148d43d8a70fac8
2
{ "blob_id": "de6cfa46a8049f6f9506889bd148d43d8a70fac8", "branch_name": "refs/heads/master", "committer_date": 1388053999000, "content_id": "aa58ef8b583bbcf00a351602ed0c2431c0a22ee0", "detected_licenses": [ "MIT" ], "directory_id": "d7a0624bc9c594b1a9b9501b11d90b33634b615d", "extension": "py", "fi...
2.375
stackv2
import http.cookiejar import gzip import logging import http.client import urllib.parse import json from platform import platform import signal import argparse from sys import stdout import os import html import getpass from urllib.error import URLError from configparser import ConfigParser logger = logging.getLogger(...
274
38.02
80
20
2,212
python
[{"finding_id": "codeql_py/insecure-protocol_7a9c6818c2bbdc8a_15da01f5", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)." ]
[ 121 ]
[ null ]
[ 43 ]
[ 77 ]
2024-11-19T02:28:50.295146+00:00
1,388,675,478,000
63d43b001fd30985d2ec167c7e781a9d8a64e985
3
{ "blob_id": "63d43b001fd30985d2ec167c7e781a9d8a64e985", "branch_name": "refs/heads/master", "committer_date": 1388675478000, "content_id": "6da460a88f56303bd13219bb350fea01088585b2", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "200b7469a041afc5fd342a29f222402879633d44", "extension": "p...
2.890625
stackv2
# This scans the entire country for various # types of places and retrieves the nearest # one to a grid of points. from random import randrange import time import requests from math import sqrt, ceil from threading import Lock, Thread from googleapikey import GOOGLE_API_KEY from distancesphere import distance_on_unit_...
165
30.45
77
20
1,437
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3289f891246b1f4f_633d5853", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priv...
[ 125, 136 ]
[ 127, null ]
[ 19, 19 ]
[ 43, 52 ]
2024-11-19T02:28:53.252480+00:00
1,581,895,056,000
b7829457ac20ec351d02adb2da65f0ade917850e
2
{ "blob_id": "b7829457ac20ec351d02adb2da65f0ade917850e", "branch_name": "refs/heads/master", "committer_date": 1581895056000, "content_id": "7d6423450dc9438e615ca4d52e1ffbd3ddf287d2", "detected_licenses": [ "MIT" ], "directory_id": "052dce0191618d79849bad52e9cdb295d2329887", "extension": "py", "fi...
2.421875
stackv2
from flask import Flask, g, render_template, url_for, flash, redirect, request, session from flaskapp import app, github from flask_github import GitHubError @app.route('/') @app.route('/home') def home(): return render_template('new_home.html', title='Home Page') @app.route('/about') def about(): return ren...
73
33.55
104
15
555
python
[{"finding_id": "codeql_py/url-redirection_e7b36f8d674b9183_40519525", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 31, 44 ]
[ null, null ]
[ 25, 21 ]
[ 33, 29 ]
2024-11-19T02:36:47.810824+00:00
1,583,860,743,000
1dc6055523c13dea08ad1f3d54bb4f4c238ab8e7
3
{ "blob_id": "1dc6055523c13dea08ad1f3d54bb4f4c238ab8e7", "branch_name": "refs/heads/master", "committer_date": 1583860743000, "content_id": "b480f559d0473a6006cabe3591bc3bfd015fcc1f", "detected_licenses": [ "MIT" ], "directory_id": "d13ac70da420c855db5f0139ad5f0b5e5847b39d", "extension": "py", "fi...
2.578125
stackv2
import os import os.path import time from bson import ObjectId from flask import request, Blueprint, make_response, jsonify from werkzeug.utils import secure_filename from instances import app from db_ops.transporter import write_to_db files = Blueprint('files', __name__) @files.route('/files/upload', methods=['POST'...
77
38.65
92
17
753
python
[{"finding_id": "codeql_py/command-line-injection_1186c07df32682ea_24727b16", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
3
true
[ "CWE-078", "CWE-078", "CWE-022" ]
[ "py/command-line-injection", "py/command-line-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 48, 52, 57 ]
[ null, null, null ]
[ 19, 19, 31 ]
[ 29, 26, 44 ]
2024-11-19T02:36:49.351202+00:00
1,609,777,270,000
cf8d69cb3d638f50f07e1e03e2781a6ec7625236
3
{ "blob_id": "cf8d69cb3d638f50f07e1e03e2781a6ec7625236", "branch_name": "refs/heads/master", "committer_date": 1609777270000, "content_id": "a01ab643409d62f1391c62be97a2ae32466635fd", "detected_licenses": [ "MIT" ], "directory_id": "1b6901a7aa276f05612f4bcfc44e5a14c31468aa", "extension": "py", "fi...
3.03125
stackv2
class GetLatLng: def __init__(self,address,api_key=None): self.address = address self.api_key = api_key def get_geocoder(sefl,address): from geopy.geocoders import Nominatim geolocator = Nominatim() loc = geolocator.geocode(address) print("latitude is :-" ,loc.latitude,"\nlongtitude is:-" ,loc.longitude...
45
27.62
81
14
372
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_89ba160d06ed63db_548dbfa4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data ...
[ 10, 10, 23 ]
[ null, null, null ]
[ 27, 61, 9 ]
[ 39, 74, 16 ]
2024-11-19T02:36:51.682198+00:00
1,693,928,169,000
1a8c6c7b1c5c7862ec22fa5a5f102f7e4fe41a67
3
{ "blob_id": "1a8c6c7b1c5c7862ec22fa5a5f102f7e4fe41a67", "branch_name": "refs/heads/main", "committer_date": 1693928169000, "content_id": "b59970bc9a0d9ad42c79692822751256ca377fa5", "detected_licenses": [ "MIT" ], "directory_id": "091a6200be74bf6577c86f623665bcc24e16b02b", "extension": "py", "file...
2.75
stackv2
# SPDX-FileCopyrightText: 2021 ladyada for Adafruit Industries # SPDX-License-Identifier: MIT """ CircuitPython GitHub Stars viewer """ import time import ssl import wifi import socketpool import displayio import board from adafruit_display_text import bitmap_label from adafruit_bitmap_font import bitmap_font import ad...
57
28.54
72
9
418
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_147250989c59ac63_95ce0d7d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 41, 43 ]
[ null, null ]
[ 7, 7 ]
[ 41, 41 ]
2024-11-19T02:37:25.044996+00:00
1,599,401,538,000
85c3a26d71f00d80479461bc3333e33ea79acae9
3
{ "blob_id": "85c3a26d71f00d80479461bc3333e33ea79acae9", "branch_name": "refs/heads/master", "committer_date": 1599401538000, "content_id": "9ea43cd8dcc0a3e152b13bd339567ff0f0012529", "detected_licenses": [ "Apache-2.0" ], "directory_id": "98c8ab4f12903fbb10adac15c7044ad3d05c097b", "extension": "py"...
3.015625
stackv2
""" Generate PDF reports from data included in several Pandas DataFrames From pbpython.com based on https://pbpython.com/pdf-reports.html """ #from __future__ import print_function import pandas as pd import numpy as np import argparse from jinja2 import Environment, FileSystemLoader from weasyprint import HTML def c...
65
40.34
95
15
612
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_34b51aa496b605ea_2d0e623a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 54 ]
[ null ]
[ 11 ]
[ 52 ]
2024-11-19T02:49:47.244448+00:00
1,692,002,585,000
615d30b71be35e06c91822871b2bc2e51d8d91ed
3
{ "blob_id": "615d30b71be35e06c91822871b2bc2e51d8d91ed", "branch_name": "refs/heads/master", "committer_date": 1692002585000, "content_id": "118a05ffc8e6306f113cc922c7bb6c00be2fed3e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "fa89ef4a8eb06dc2015d7116637f230b6891eb8d", "extension": "p...
3.078125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import re from refinery.units import Arg, Unit class url(Unit): """ Decodes and encodes URL-Encoding, which preserves only alphanumeric characters and the symbols `_`, `.`, `-`, `~`, `\\`, and `/`. Every other character is escaped by hex-encoding it and pref...
43
30.16
133
17
360
python
[{"finding_id": "codeql_py/overly-large-range_3beb86e81cefac3e_2b94f875", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and overlaps with a-z in the same character class." ]
[ 35 ]
[ null ]
[ 41 ]
[ 44 ]
2024-11-19T03:00:11.702724+00:00
1,591,101,492,000
291addd79f59ae540c698d2d33b080aae2a5d1ef
3
{ "blob_id": "291addd79f59ae540c698d2d33b080aae2a5d1ef", "branch_name": "refs/heads/master", "committer_date": 1591101492000, "content_id": "5ca0bc9135340cd909bc986878798014765bbb6c", "detected_licenses": [ "CC0-1.0" ], "directory_id": "515d381afd5fc6f47833c018f14cfdf9e6d927f6", "extension": "py", ...
2.859375
stackv2
# # Copyright (c) 2020 by Alexis LEBEL, BOUDRY Hugo and PEDROSA Théo. All Rights Reserved. # import csv import hashlib class CsvActions: #Constructor def __init__(self, path:str): self.PATH = path return None def setPath(self, topath:str): self.PATH = topath; return None ...
127
32.08
171
17
1,015
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_fefb4953aef7fa85_b470a464", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 74 ]
[ null ]
[ 33 ]
[ 50 ]
2024-11-19T03:00:12.359793+00:00
1,607,634,193,000
21b8dea338dee12f8a556f05644d0cda0e51e047
3
{ "blob_id": "21b8dea338dee12f8a556f05644d0cda0e51e047", "branch_name": "refs/heads/master", "committer_date": 1607634193000, "content_id": "bd89f4aff617ca4cbf16865db75cf51675f4d66a", "detected_licenses": [ "MIT" ], "directory_id": "a6c3bef4df9bd267fa2476448f8e3558ee06a797", "extension": "py", "fi...
3.109375
stackv2
# Import necessary modules from flask import Flask, request, jsonify import pickle import pandas as pd import traceback # Create an instance of Flask class app = Flask(__name__) # Use pickle to load in the pre-trained model. with open('model_rf.pkl', 'rb') as m: model_rf = pickle.load(m) # Use pickle to load i...
57
31.04
80
17
387
python
[{"finding_id": "codeql_py/stack-trace-exposure_6fdfe29c903098dd_9007962f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 50, 56 ]
[ null, null ]
[ 28, 5 ]
[ 61, 24 ]
2024-11-19T03:00:14.294540+00:00
1,404,837,727,000
14a9bdafcf44f02c4d403e4dffa94854bf76b6ab
3
{ "blob_id": "14a9bdafcf44f02c4d403e4dffa94854bf76b6ab", "branch_name": "refs/heads/master", "committer_date": 1404837727000, "content_id": "12d8c4397968d51875b211170960efb5df267922", "detected_licenses": [ "MIT" ], "directory_id": "66e3dfdca3db768975dc62c46c5a52ffda51feda", "extension": "py", "fi...
2.6875
stackv2
#-*- encoding: utf-8 -*- """ :Author: Arne Simon [arne.simon@slice-dice.de] """ import requests from .config import Config class AuthException(Exception): pass class Auth(object): """ This class wraps the Api user authorization interface. :param credentials: The app credentials. :param conf...
103
31.85
97
17
713
python
[{"finding_id": "codeql_py/request-without-cert-validation_3fb6f8bf40195184_2bac6ad4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 57 ]
[ 59 ]
[ 20 ]
[ 46 ]
2024-11-19T03:00:22.734803+00:00
1,624,729,934,000
95145f4cdec775e839d15d392660b82dc60ccda6
3
{ "blob_id": "95145f4cdec775e839d15d392660b82dc60ccda6", "branch_name": "refs/heads/master", "committer_date": 1624729934000, "content_id": "a369af26729671f7acdc2fe8c4da420ad639381f", "detected_licenses": [ "MIT" ], "directory_id": "527595f5dea7cb3746c4b204798d02078a1dfeb1", "extension": "py", "fi...
3.140625
stackv2
from Crypto.Cipher import AES from Crypto.Util import Padding def padding_func(data, size_b): data_padded = Padding.pad(data, size_b) return data_padded def unpadding_func(data, size_b): data_unpadded = Padding.unpad(data, size_b) return data_unpadded def aes_ecb_encrypt(data, key): cipher = AES....
45
31.62
68
14
390
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_4ce17156da715dae_64ddfb00", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 14, 18 ]
[ null, null ]
[ 12, 12 ]
[ 32, 32 ]
2024-11-19T03:00:30.337492+00:00
1,549,856,614,000
d293fd6bf7af6130b69c54d2294bfe191e712d55
2
{ "blob_id": "d293fd6bf7af6130b69c54d2294bfe191e712d55", "branch_name": "refs/heads/master", "committer_date": 1549856614000, "content_id": "428db11228756e2095555457d09041e5020b48b8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f6f95ff6e57e0f34fe4bde19425fad3640113373", "extension": "py"...
2.390625
stackv2
from flask_restful import request import logging from .utils import requires_auth, log_request from .base import BaseResource from ..services.utils import APIResponse from runner_service import configuration from ..utils import create_token import datetime logger = logging.getLogger(__name__) class Login(BaseResourc...
77
43.51
132
25
717
python
[{"finding_id": "codeql_py/log-injection_40b95e2118543359_62eb4f4f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 63, 68 ]
[ null, null ]
[ 41, 29 ]
[ 110, 94 ]
2024-11-19T03:00:30.858717+00:00
1,541,523,908,000
57320a5ecc08081e11ba2fbf016c7cfe15785f07
3
{ "blob_id": "57320a5ecc08081e11ba2fbf016c7cfe15785f07", "branch_name": "refs/heads/master", "committer_date": 1541523908000, "content_id": "7234e6c499bd8187c489ed37f15ccde9244ca164", "detected_licenses": [ "Apache-2.0" ], "directory_id": "73297a722d6bfc1d495786f28e8e5f1593c3f68b", "extension": "py"...
3.09375
stackv2
#_*_coding=UTF-8_*_ import zipfile import argparse import os from os.path import * def tryZipPwd(zipFile, password, savePath): try: zipFile.extractall(path=savePath, pwd=password.encode('utf-8')) print('[+] Zip File decompression success,password: %s' % (password)) return True except: ...
51
30.57
89
18
393
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5de0c217b19d7358_47b29e6d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 10, 13 ]
[ null, null ]
[ 15, 15 ]
[ 77, 76 ]
2024-11-19T03:11:21.947582+00:00
1,543,420,427,000
752a26ea954c94e50d44a7908feac2dbec2fc7cf
3
{ "blob_id": "752a26ea954c94e50d44a7908feac2dbec2fc7cf", "branch_name": "refs/heads/master", "committer_date": 1543420427000, "content_id": "0a07e8ecfa95d30559683b8fed954d7de72bd225", "detected_licenses": [ "MIT" ], "directory_id": "787ae2998a000091bddbd55d1e24ba56e4a117e0", "extension": "py", "fi...
2.546875
stackv2
# -*- coding: utf-8 -*- ''' multiprocessing crawler for jandan.net/ooxx "pip install -r requirements.txt" and run it. The line with notes is position you can control this script. Have fun. @author: B1u3Buf4 ''' import os import re import time from multiprocessing import Process, Queue, Pool import requests from sel...
94
27.64
103
15
694
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_692a02e907de94fb_40c5310d", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [jandan.net](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [jandan.net](1) may be at an arbitrary position in the sanitized URL." ]
[ 57 ]
[ null ]
[ 16 ]
[ 35 ]
2024-11-19T03:12:36.346212+00:00
1,597,165,542,000
346d1c528c5b83eaabf9b95464f5e82ef629c951
2
{ "blob_id": "346d1c528c5b83eaabf9b95464f5e82ef629c951", "branch_name": "refs/heads/master", "committer_date": 1597165542000, "content_id": "c2dddcac30f4b198e6ba99e9197a317fa8de8046", "detected_licenses": [ "MIT" ], "directory_id": "8cf5404151bfdf5132d5feef56c216a58af29d3f", "extension": "py", "fi...
2.421875
stackv2
import Preprocessor import Trainer import Predictor import os from flask import Flask, render_template, request, json, send_file from werkzeug import secure_filename import base64 app = Flask(__name__) predictions = {"count": 0} new_faces = 0 @app.route("/") def home(): return "Server working fine" @app.route(...
85
32.22
82
17
655
python
[{"finding_id": "codeql_py/path-injection_7cb84e7e09909d7d_7f6ed32e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 78 ]
[ null ]
[ 22 ]
[ 30 ]
2024-11-19T03:12:37.868948+00:00
1,611,445,336,000
efe87333e498197a707d19be85356b716021c41e
4
{ "blob_id": "efe87333e498197a707d19be85356b716021c41e", "branch_name": "refs/heads/master", "committer_date": 1611445336000, "content_id": "15830007c598a7985515e41a08608980a2794ed4", "detected_licenses": [ "MIT" ], "directory_id": "220d1675123669aae6250b1f51e430731af0ddee", "extension": "py", "fi...
4.21875
stackv2
# Crie um programa que simule o funcionamento de um caixa eletrônico # No início, pergunte ao usuário qual será o valor a ser sacado (número inteiro) e o programa vai informar quantas cédulas de cada valor serão entregues # OBS: Considere que o caixa possui cédulas de R$ 50, R$ 20, R$ 10 e R$ 1 from datetime import da...
49
30.65
152
14
468
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c534b281c9a95995_49d20dfe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]...
[ 24, 26 ]
[ null, null ]
[ 19, 19 ]
[ 72, 73 ]
2024-11-19T03:12:47.772347+00:00
1,532,142,375,000
21156a9c54e4aa265bd9adafa8af07b72b5b502c
3
{ "blob_id": "21156a9c54e4aa265bd9adafa8af07b72b5b502c", "branch_name": "refs/heads/master", "committer_date": 1532142375000, "content_id": "736d5c81c05f575a6f1bdb47ed30b7df4b03ba31", "detected_licenses": [ "Apache-2.0" ], "directory_id": "afe04cd22c2a839668dd0f29c314cc4b35bc7345", "extension": "py"...
2.640625
stackv2
# coding: utf-8 import hashlib import time import urllib2 # 请替换appkey和secret appkey = "235817354" secret = "9dab67c52899767b69d31b0c8ef06ebd" paramMap = { "app_key": appkey, "timestamp": time.strftime("%Y-%m-%d %H:%M:%S") # 如果你的程序在国外,请进行时区处理 } # 排序 keys = paramMap.keys() keys.sort() codes = "%s%s%s" % (secre...
42
23.83
94
11
376
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7c3c915a02b87389_dcc3aef2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 20 ]
[ null ]
[ 20 ]
[ 25 ]
2024-11-19T03:25:36.465525+00:00
1,575,299,297,000
6afc138198c64184503ebdaaec66cc15bf58d864
3
{ "blob_id": "6afc138198c64184503ebdaaec66cc15bf58d864", "branch_name": "refs/heads/master", "committer_date": 1575299297000, "content_id": "580db76a7d4bc7b0d1ee014268e235791b4c48d2", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "5538f373989f3f0c66ced9d88351a4c5d60c53ec", "extension": "p...
2.546875
stackv2
import logging import boto3 import types from pymacaron_core.swagger.apipool import ApiPool from pymacaron.config import get_config from pymacaron.exceptions import PyMacaronException from pymacaron.monitor import monitor log = logging.getLogger(__name__) db = None def get_dynamodb(): global db if not db:...
248
29.39
159
18
1,744
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e44431c4ae0f6c57_ee615c45", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 21 ]
[ null ]
[ 18 ]
[ 159 ]
2024-11-19T03:35:46.022607+00:00
1,423,883,470,000
f2ff576d6af4c8cd22c4a1f498f6c0ea979094de
2
{ "blob_id": "f2ff576d6af4c8cd22c4a1f498f6c0ea979094de", "branch_name": "refs/heads/master", "committer_date": 1423883470000, "content_id": "8c72fd837c7dfeb3aa336e8af5989d8bd464e414", "detected_licenses": [ "MIT" ], "directory_id": "b9bdcca4bbfccc385769089e65467b0d0d4ca392", "extension": "py", "fi...
2.484375
stackv2
import time from .base import BaseField, ObjectIdField from .operations import String, Number, Common, List, Reference from .exceptions import ValidationError from .documents import Document import re import datetime import copy import functools __all__ = ['ObjectIdField', 'GenericField', 'StringField', 'EmailField', ...
423
32.49
133
25
2,992
python
[{"finding_id": "codeql_py/redos_96c97ee969fe7915_b5d3d097", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'." ]
[ 50 ]
[ null ]
[ 14 ]
[ 88 ]
2024-11-19T01:28:41.773850+00:00
1,500,422,773,000
5c9bf1ca526995a6cc7c251c9b05e4005926d409
3
{ "blob_id": "5c9bf1ca526995a6cc7c251c9b05e4005926d409", "branch_name": "refs/heads/master", "committer_date": 1500422773000, "content_id": "eb6df24de1ebfc73472eb5e92e6a7151f65ea7fd", "detected_licenses": [ "MIT" ], "directory_id": "3a7af779e3b6a5a1a35cd4f1cc93d095bf7dbd23", "extension": "py", "fi...
2.59375
stackv2
# -*- coding: utf-8 -*- import paramiko import logging class SSHConn: logger = logging.getLogger('scripts') def __init__(self, hostname, port, username, password): self.client = paramiko.SSHClient() self.client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) self.client.connect(hostname=hostname, port=...
49
26.65
89
15
342
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b63da216a25bbeb5_bd0952e2", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 11 ]
[ null ]
[ 3 ]
[ 68 ]
2024-11-19T01:29:08.075925+00:00
1,397,727,216,000
69ac5abad6d03d4f64e4a03f81d4b4535d0b7cc7
2
{ "blob_id": "69ac5abad6d03d4f64e4a03f81d4b4535d0b7cc7", "branch_name": "refs/heads/master", "committer_date": 1397727363000, "content_id": "5a9d1662be54e0c374e8ec0ae6d07016e74adfcf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "32327fcd0ebb5348aae388ae4cf42898da710189", "extension": "py"...
2.3125
stackv2
# -*- coding: utf-8 -*- import string import random import json import requests from django.shortcuts import render_to_response, redirect from django.template import RequestContext from django.conf import settings from django.contrib import messages from swiftbrowser_swauth.forms import CreateUserForm, PasswordForm,...
174
36.24
102
20
1,309
python
[{"finding_id": "codeql_py/request-without-cert-validation_b2a448da2bd7a6a0_c9e4b430", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 42, 83, 114, 141, 151 ]
[ null, null, null, null, null ]
[ 16, 20, 16, 16, 24 ]
[ 64, 68, 67, 72, 77 ]
2024-11-19T01:29:28.902521+00:00
1,621,048,630,000
b9ae57e4f893e72dd79770e591e171225feb933f
3
{ "blob_id": "b9ae57e4f893e72dd79770e591e171225feb933f", "branch_name": "refs/heads/main", "committer_date": 1621048630000, "content_id": "563cb9af76ab6a2ac5bd7ff78f290926dd1f78fe", "detected_licenses": [ "MIT" ], "directory_id": "fbc5eb311ad446be9f5865d20504a591d95158fc", "extension": "py", "file...
2.609375
stackv2
from flask import request, render_template from flask.json import jsonify from neural_network import neural_network import requests from app import app neural_network = neural_network(); types = ['T-Shirt', 'Pants', 'Pullover', 'Dress', 'Coat', 'Sandel' 'Shirt', 'Sneaker', "Bag", 'Ankle boot'] @app.route('/api/...
27
27.44
66
14
194
python
[{"finding_id": "codeql_py/full-ssrf_ec8457b650175412_630dc5ef", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 15 ]
[ null ]
[ 7 ]
[ 40 ]
2024-11-19T01:29:29.964318+00:00
1,622,832,276,000
9a37f0b43db9054f1b51386bd13a500f47f6966b
3
{ "blob_id": "9a37f0b43db9054f1b51386bd13a500f47f6966b", "branch_name": "refs/heads/main", "committer_date": 1622832276000, "content_id": "c8aa42ea712fc6f70ef14e2d653d7c259ea9c7de", "detected_licenses": [ "MIT" ], "directory_id": "ea63d3620a093f06df02ccb567d1358f45e8d38a", "extension": "py", "file...
2.578125
stackv2
""" Unity3D Lidar Simulation - Kafka connector. """ import json from kafka import KafkaProducer from fastapi import FastAPI, Request app = FastAPI() producer = KafkaProducer(value_serializer=lambda m: json.dumps(m).encode('ascii'), bootstrap_servers=["localhost:9092"]) processed_points = set() @app.post("/") async d...
25
30.68
120
16
170
python
[{"finding_id": "codeql_py/code-injection_6dc0cb34e3a60d1e_3ee77bf3", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 22 ]
[ null ]
[ 24 ]
[ 39 ]
2024-11-19T01:29:32.814864+00:00
1,493,911,846,000
3bcf7cac00fce89783602cc93548a0b67b618247
3
{ "blob_id": "3bcf7cac00fce89783602cc93548a0b67b618247", "branch_name": "refs/heads/master", "committer_date": 1493911846000, "content_id": "c614def474618e4cfd44656662d9ea7ab137c150", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "1fa54da06863525b65cf31aad999116edb493533", "extension": "p...
2.5625
stackv2
#!/usr/bin/env python3 import requests, re, os, time, signal, sys, argparse tl = os.path.expanduser("~") + '/.threadlist' parser = argparse.ArgumentParser(description='4chan thread image downloader.') parser.add_argument('-a', '--add', help='Adds url to thread list.', nargs=1, action='store', dest='add', metavar='URL')...
112
37.6
163
30
1,148
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_af15a39ebd981884_b6de9a36", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before '(?:i.4cdn|is\\[0-9\\]?.4chan).org/'...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before '(?:i.4cdn|is\\[0-9\\]?.4chan).org/', so it might match more hosts than expected." ]
[ 104 ]
[ null ]
[ 49 ]
[ 136 ]
2024-11-19T01:30:15.097241+00:00
1,552,414,634,000
c8be62873f1fe3106ddcf5196679a16f5a7e9aed
4
{ "blob_id": "c8be62873f1fe3106ddcf5196679a16f5a7e9aed", "branch_name": "refs/heads/master", "committer_date": 1552414634000, "content_id": "4a20e55b58c0666dfd5791291a482f767bdc0a5f", "detected_licenses": [ "MIT" ], "directory_id": "1bdf5ef22f0a4dd3a6d9294d02b05be88ce0f536", "extension": "py", "fi...
4.25
stackv2
def budget(): salary = float(input("Please input your salary: ")) monthly_income = round(salary/12, 2) print("Your monthly income is:", monthly_income) print() housing = round(monthly_income * .25, 2) transport = round(monthly_income * .15, 2) food = round(monthly_income * .12, 2) savin...
32
31.78
103
14
284
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_12a089f933844b3d_fcd75b23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 24, 30 ]
[ null, null ]
[ 22, 27 ]
[ 29, 32 ]
2024-11-19T01:30:24.920031+00:00
1,526,301,686,000
6c1792e54115ecb978e70afcb83948bdafcae03e
3
{ "blob_id": "6c1792e54115ecb978e70afcb83948bdafcae03e", "branch_name": "refs/heads/master", "committer_date": 1526301686000, "content_id": "74273312831d6f79fd7d2539bb5270ed9fddb372", "detected_licenses": [ "MIT" ], "directory_id": "cc9185d8736e48d9413d9d3c0eb6a9e1330db0a2", "extension": "py", "fi...
2.59375
stackv2
""" pymake ------------------------------- - Eugenio Marinetto - nenetto@gmail.com ------------------------------- Created 08-05-2018 """ import json import re import copy import pkg_resources import os from inspect import getmembers, isfunction from pymake.utils.common.prettymessaging import PrettyMessaging def j...
135
27.63
88
19
908
python
[{"finding_id": "codeql_py/redos_00a94cca960399ba_aff8d5b8", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{a' and containing many repetiti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '{{a' and containing many repetitions of '-'." ]
[ 86 ]
[ null ]
[ 41 ]
[ 47 ]
2024-11-19T01:54:59.693760+00:00
1,619,283,584,000
ffdb4a967da48432b9dea20488572034f97857f2
2
{ "blob_id": "ffdb4a967da48432b9dea20488572034f97857f2", "branch_name": "refs/heads/main", "committer_date": 1619283584000, "content_id": "909b2e3bedab5ab6ca2342a9f924dbf56ebc3b3e", "detected_licenses": [ "MIT" ], "directory_id": "eae730ffe453d54561dd5694257b470f476ae596", "extension": "py", "file...
2.328125
stackv2
from PyQt5.QtWidgets import (QLabel) from PyQt5.QtCore import (Qt, QRect, QThread) from PyQt5.QtGui import (QPen, QColor, QFont, QBrush, QPainter, QFontMetricsF) from .PicWindow import PicWindow from PIL import Image, ImageQt from io import BytesIO import requests import re import time class TMessageLabel(QLabel): ...
204
40.4
167
25
2,152
python
[{"finding_id": "codeql_py/overly-large-range_697f856a267ccca7_9f478770", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 43 ]
[ null ]
[ 45 ]
[ 48 ]
2024-11-19T01:55:12.205634+00:00
1,387,673,139,000
445a14a0346a870af65f02f89d44c996f2589602
3
{ "blob_id": "445a14a0346a870af65f02f89d44c996f2589602", "branch_name": "refs/heads/master", "committer_date": 1387673139000, "content_id": "08daf94f094bc30fa27e9d0d2df77e8cdd0df30a", "detected_licenses": [ "MIT" ], "directory_id": "93ce332f72e8bb5362f8434f0e98087e3ac46194", "extension": "py", "fi...
2.5625
stackv2
"""server_web.py, web interface for the logs. """ __author__ = "Jean-Martin Archer" __copyright__ = "Copyright 2013, MIT License." from os import listdir, path from functools import wraps import re from flask import Flask, request, Response, render_template, Markup, url_for import configuration app = Flask('HTTP') ...
88
29.05
102
16
611
python
[{"finding_id": "codeql_py/path-injection_353e3d4ca01c0593_48dc0d3c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 54 ]
[ null ]
[ 15 ]
[ 20 ]
2024-11-19T01:55:21.518201+00:00
1,494,574,128,000
f2a697da5b273609fb8cd9a547d5f6d6607ae48b
2
{ "blob_id": "f2a697da5b273609fb8cd9a547d5f6d6607ae48b", "branch_name": "refs/heads/master", "committer_date": 1494574128000, "content_id": "ef53ab7787ebc860e521ac50cd39a063c589fc2a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6a0ec23dc7fbd9637dec95d6c756e1287da9ee90", "extension": "py"...
2.46875
stackv2
''' @Summary: API endpoint for accessing facial recognition services through MSFT Engine ''' from flask_restful import Resource, reqparse from api import login_required from api.sql.models import * #import all of the models from models.py from flask import send_file, request import os, uuid, imghdr, time from .MSFTFa...
85
42.38
141
17
1,021
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1072396c4d8840c6_3499ec5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-022", "CWE-022" ]
[ "py/clear-text-logging-sensitive-data", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis path depends on a [user-provided value](3).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided v...
[ 13, 19, 83 ]
[ null, null, null ]
[ 41, 30, 30 ]
[ 74, 141, 123 ]
2024-11-19T01:55:24.983962+00:00
1,550,422,458,000
21f2e46891b6a19f2a478367b74bd323c1938266
3
{ "blob_id": "21f2e46891b6a19f2a478367b74bd323c1938266", "branch_name": "refs/heads/master", "committer_date": 1550422458000, "content_id": "684d79066833e18eb64dd0a8bb0d5e7fc96bcf49", "detected_licenses": [ "MIT" ], "directory_id": "01d58dde8c2e0066cafde29cf3a2d06290a03c73", "extension": "py", "fi...
2.90625
stackv2
import requests import json import sys # All things that will remain constant apiKey = '5d40f2852229ce9f706e44f3ed93dad1' # METHODS ---------------------------------------------------------------------------- #=======================================This method returns a first and last name from just a first name==...
200
26.59
126
14
1,505
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0c4011559a9f8488_6bb3473b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 188, 190, 192, 194, 196 ]
[ null, null, null, null, null ]
[ 8, 8, 8, 8, 8 ]
[ 34, 34, 64, 63, 59 ]
2024-11-19T02:06:44.730372+00:00
1,633,877,980,000
456687c81bd5fd1b11a6aca6733964feed11865c
3
{ "blob_id": "456687c81bd5fd1b11a6aca6733964feed11865c", "branch_name": "refs/heads/main", "committer_date": 1633877980000, "content_id": "90ce578c035b2163fcca9ffe7778b7c0051fef22", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "fc38ee2d842fdde4b9c8c5a164fe0a144c442688", "extension": "py"...
2.640625
stackv2
# -*- coding: utf-8 -*- #!/usr/bin/python import os from datetime import datetime,timedelta import pandas as pd import smtplib from tabulate import tabulate import tabulate tabulate.PRESERVE_WHITESPACE = True from dotenv import load_dotenv load_dotenv()# look for a file named .env in the current directory and will a...
101
24.69
147
14
730
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_536a0e9ec3f5d917_917f1b8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ null ]
[ 15 ]
[ 25 ]
2024-11-19T02:06:55.402943+00:00
1,571,791,428,000
038fbad3be60b433fbd8da9f696a741b946dc322
2
{ "blob_id": "038fbad3be60b433fbd8da9f696a741b946dc322", "branch_name": "refs/heads/master", "committer_date": 1572475766000, "content_id": "6c06ea60a23be4d0479504cdcc591ab90dd80a96", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cbc0bfb03e5b5ea32d2883a4e2b0bcf885b628dc", "extension": "py"...
2.4375
stackv2
import html import logging import os import subprocess from html.entities import html5, name2codepoint import regex as re from subword_nmt.apply_bpe import BPE class Preprocessor(object): def __init__(self, bpe_code_file): super(Preprocessor, self).__init__() symbols = '' symbol_set = se...
135
35.62
118
16
1,334
python
[{"finding_id": "codeql_py/overly-permissive-file_3bd8248df3a31663_6375e367", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 83, 129 ]
[ null, null ]
[ 13, 9 ]
[ 31, 37 ]
2024-11-19T02:07:23.603301+00:00
1,682,626,122,000
209281e721705997078240892df19adf8485c95a
3
{ "blob_id": "209281e721705997078240892df19adf8485c95a", "branch_name": "refs/heads/master", "committer_date": 1682628672000, "content_id": "854ba017e08e11dc5f7549536c71e1a4899f9100", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "b3e35e48003af5b53a2f884386af9bfb75ececf5", "extension": "p...
2.65625
stackv2
import yaml from jinja2 import Environment, FileSystemLoader import pathlib import contextlib import io from functools import wraps import logging import os def render_yaml_template(template_name, servers_path, vars={}): """ Function in charge of generating file content based on: - a template file name, th...
106
37.19
112
16
900
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_df836130592a9dd7_8334ac5e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 28, 52 ]
[ null, null ]
[ 11, 11 ]
[ 60, 60 ]