added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T02:59:15.930709+00:00
1,382,780,953,000
907135a728faed31b2165efbb0f9d8d1778fcda1
2
{ "blob_id": "907135a728faed31b2165efbb0f9d8d1778fcda1", "branch_name": "refs/heads/master", "committer_date": 1382780953000, "content_id": "17f393b193e173717b81a199f467650254b65ccc", "detected_licenses": [ "BSD-2-Clause", "BSD-3-Clause" ], "directory_id": "85045953314a1cf340a6e954bd0763864f6ec78b...
2.375
stackv2
#!/usr/bin/python import csv import os.path from collections import namedtuple import sn import os import sys,string import numpy as np import math import vcf try: file_map = sys.argv[1];dir_files_phenotype1 = sys.argv[2];dir_files_phenotype2 = sys.argv[3];outfilename = sys.argv[4] except: print "Usage:",s...
146
19.2
123
15
874
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6ca7a18fe8ca1a25_747671f1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive d...
[ 88, 138 ]
[ null, null ]
[ 18, 18 ]
[ 58, 58 ]
2024-11-19T02:59:20.915896+00:00
1,457,841,851,000
f8f9c2cd049ff482f689eb4b713c42e7109e8c44
2
{ "blob_id": "f8f9c2cd049ff482f689eb4b713c42e7109e8c44", "branch_name": "refs/heads/master", "committer_date": 1457841851000, "content_id": "a0777393bb687bf762070d5537d0a7b1a2efe37e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e9b9bbd57dd9f596a564b651155309844b770842", "extension": "py"...
2.4375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from __future__ import absolute_import from __future__ import print_function from __future__ import division from __future__ import unicode_literals import os import re import sys import glob import locale import sublime try: from . import __version__, __title__ excep...
577
24.76
79
15
3,494
python
[{"finding_id": "codeql_py/tarslip_937c9ed03855ac11_3e88113c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 259 ]
[ null ]
[ 21 ]
[ 25 ]
2024-11-19T02:59:33.976846+00:00
1,508,018,460,000
83628fb0020490056090c6e9e7f14f38a752ca33
3
{ "blob_id": "83628fb0020490056090c6e9e7f14f38a752ca33", "branch_name": "refs/heads/master", "committer_date": 1508018460000, "content_id": "42bc458c5aea06ba4cbff6ca2630d6b45470a2b8", "detected_licenses": [ "MIT" ], "directory_id": "7d3025cef760f337505a7a15bcf719bf8e170d87", "extension": "py", "fi...
3.25
stackv2
# This is a _very simple_ example of a web service that recognizes faces in uploaded images. # Upload an image file and it will check if the image contains a picture of Barack Obama. # The result is returned as json. For example: # # $ curl -F "file=@obama2.jpg" http://127.0.0.1:5001 # # Returns: # # { # "face_found_i...
116
26.83
112
17
801
python
[{"finding_id": "codeql_py/full-ssrf_7b47fd173e9cf54e_7a7a43bc", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
4
true
[ "CWE-918", "CWE-918", "CWE-601", "CWE-601" ]
[ "py/full-ssrf", "py/full-ssrf", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 48, 61, 86, 91 ]
[ null, null, null, null ]
[ 15, 17, 29, 29 ]
[ 42, 41, 40, 40 ]
2024-11-19T02:59:35.805474+00:00
1,527,054,158,000
2a5a793ac49a3ae706a910e1e2e91981b63c019e
2
{ "blob_id": "2a5a793ac49a3ae706a910e1e2e91981b63c019e", "branch_name": "refs/heads/master", "committer_date": 1527054158000, "content_id": "838594915eb59094fcf11adf5189354fbdced959", "detected_licenses": [ "MIT" ], "directory_id": "f5de0f665abdce583fb5449008896d82c5bd22a8", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python3 from flask import Flask, render_template, request, jsonify from flask_uploads import UploadSet, configure_uploads, IMAGES import numpy as np from PIL import Image, ImageSequence from shapely.geometry import Point, Polygon from werkzeug.datastructures import FileStorage import urllib from io impor...
149
31.9
145
17
1,281
python
[{"finding_id": "codeql_py/flask-debug_ce7cecf6c1fd7908_f19d4899", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 149, 90, 122 ]
[ null, null, null ]
[ 5, 15, 15 ]
[ 24, 19, 25 ]
2024-11-19T02:59:42.268845+00:00
1,634,125,735,000
c18838c726dedfeb507d5369e0efd9bb4d4f774f
3
{ "blob_id": "c18838c726dedfeb507d5369e0efd9bb4d4f774f", "branch_name": "refs/heads/main", "committer_date": 1634125735000, "content_id": "232c951c8328e507b59ef3c69119a571bcacf835", "detected_licenses": [ "MIT" ], "directory_id": "2a1dd0fb906d8a5a947c783ce376ed49365f555a", "extension": "py", "file...
2.640625
stackv2
import os from flask import (Blueprint, request) import json import requests # stored Companies House API_Key locally - accessed from backend. # This can be passed to frontend through API call rather then storing on .env for use on client side # Note: for production or real use cases, this should also be encrypted fo...
63
35.56
100
16
482
python
[{"finding_id": "codeql_py/reflective-xss_6966c70d91376a07_bef07c62", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-918", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 63, 35, 40 ]
[ null, 38, 43 ]
[ 12, 24, 25 ]
[ 26, 6, 6 ]
2024-11-19T03:12:05.014212+00:00
1,634,751,540,000
df7165b5d252033e33e39e90dbea77fb247ba673
3
{ "blob_id": "df7165b5d252033e33e39e90dbea77fb247ba673", "branch_name": "refs/heads/main", "committer_date": 1634751540000, "content_id": "4dd5905d9f7b51e27de4d0c862d337a9918b5ecd", "detected_licenses": [ "MIT" ], "directory_id": "e55cc6431790570c2534ebe094ec2be0d36c2385", "extension": "py", "file...
2.890625
stackv2
import re import requests import json from ..models.models import Usuario from ..models.exceptions import UserNotValid def __email_is_valid(email: str) -> bool: if not isinstance(email, str): return False regex = r'^(\w|\.|\_|\-)+[@](\w|\_|\-|\.)+[.]\w{2,3}$' return bool(re.search(regex, email)) ...
88
25.15
71
11
604
python
[{"finding_id": "codeql_py/redos_f872e33589a57c93_ab5687e3", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'." ]
[ 12, 12 ]
[ null, null ]
[ 16, 33 ]
[ 30, 47 ]
2024-11-19T03:12:15.390613+00:00
1,607,567,381,000
9547e855b5bc7b2518afe665cd003b9b48822124
3
{ "blob_id": "9547e855b5bc7b2518afe665cd003b9b48822124", "branch_name": "refs/heads/main", "committer_date": 1607567381000, "content_id": "6998942c3e9c80c6d3dd9662addbe9d0cfa72761", "detected_licenses": [ "MIT" ], "directory_id": "dc847ce8da736d58a9fad52c75a02dcc3fd8e507", "extension": "py", "file...
2.5625
stackv2
from random import randint, choice from fake_useragent import UserAgent import shutil import os import datetime import time import requests from bs4 import BeautifulSoup global baseurl baseurl = "https://prnt.sc/" times = (str(datetime.datetime.now().minute)+"-"+str(datetime.datetime.now().second)) global fileo fileo =...
41
39.17
135
26
471
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d2d7fafee48d0231_87d2e591", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [//st.prntscr.com/](1) may be at an arbitrary position ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [//st.prntscr.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 30 ]
[ null ]
[ 16 ]
[ 42 ]
2024-11-19T03:24:36.179275+00:00
1,611,633,741,000
e16731be36a52960732c8953bf532d30399672a7
2
{ "blob_id": "e16731be36a52960732c8953bf532d30399672a7", "branch_name": "refs/heads/main", "committer_date": 1611633741000, "content_id": "89357f56fa5e500287dbafc6736e6ef57fd3db6a", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "8996997462385e2ea8d5ce31a0114fd399caa074", "extension": "py"...
2.453125
stackv2
from fastapi import ( FastAPI, Response, status, Depends, Request, Cookie ) from fastapi.responses import HTMLResponse import jwt import json from typing import Optional from models import ( SatellitesList, TxResponse, SatelliteBase ) from markdown import markdown from utils imp...
128
25.44
129
18
771
python
[{"finding_id": "codeql_py/cookie-injection_cd2e94a34cdabd97_1d71a9ac", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-020" ]
[ "py/cookie-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1)." ]
[ 92 ]
[ null ]
[ 37 ]
[ 41 ]
2024-11-19T03:24:41.056577+00:00
1,614,967,259,000
12b4473868b0da816f993f3840668d352162e3ca
3
{ "blob_id": "12b4473868b0da816f993f3840668d352162e3ca", "branch_name": "refs/heads/main", "committer_date": 1614967259000, "content_id": "df8aa62c3918771aaf18ee9ac97e6555bb31ed9d", "detected_licenses": [ "MIT" ], "directory_id": "1caec96f60692080f1a1e3fd52353b3c2982f3de", "extension": "py", "file...
2.890625
stackv2
# # Forvo API # A class to automate the download of a pronunciation using the Forvo API. The top rated pronunciation is # retrieved. Duplicates are avoided. A filename / path is returned. # # Secrets are retrieved from AWS SSM Parameter Store abstracted in secrets.py # # Distributed under MIT license (see licens...
65
27.06
117
13
459
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c84ac1dae52e37ce_c708cbfc", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 49 ]
[ null ]
[ 22 ]
[ 33 ]
2024-11-19T03:24:45.248391+00:00
1,670,454,730,000
a24a27935201e89606e9f821535c85d73b711e04
2
{ "blob_id": "a24a27935201e89606e9f821535c85d73b711e04", "branch_name": "refs/heads/main", "committer_date": 1670454730000, "content_id": "83e84c5bed8da38c54f41320b04d3965e5053eb3", "detected_licenses": [], "directory_id": "ee45c9c8abb6315f2b5b04b7bc0f1e78aca40be4", "extension": "py", "filename": "model...
2.359375
stackv2
import hashlib import logging import os from django.db import models from django.db.models import signals logger = logging.getLogger(__name__) class Application(models.Model): client_id = models.CharField(max_length=20, unique=True, blank=False) client_secret = models.CharField(max_length=40, blank=True) ...
46
28.87
85
12
282
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d610ca266fd51952_1f80c326", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 41 ]
[ 42 ]
[ 13 ]
[ 57 ]
2024-11-19T03:24:46.027536+00:00
1,544,828,210,000
73535206d4ee008c72c854cb48d9d8aaf089df05
2
{ "blob_id": "73535206d4ee008c72c854cb48d9d8aaf089df05", "branch_name": "refs/heads/master", "committer_date": 1544828210000, "content_id": "d09e093f980af756a5c60202b1d7904d73494743", "detected_licenses": [ "MIT" ], "directory_id": "6aa352fba6c2b44bfdd9b674e6e4e764e2e5e272", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, request, jsonify, abort import pymysql import config as config from flask_cors import CORS import json import datetime from python_http_client import exceptions from DASHR import findSNs, compCrawl app = Flask(__name__) CORS(app) connection = pymysql.connect(host=config.mysql['host'], ...
69
26.51
73
13
439
python
[{"finding_id": "codeql_py/stack-trace-exposure_41ad80b702192476_5b0c53de", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 29 ]
[ null ]
[ 16 ]
[ 27 ]
2024-11-19T01:37:53.791891+00:00
1,573,674,631,000
6cd65453baf8d4f2f81c6ff9b134b8f9e1c06cb6
3
{ "blob_id": "6cd65453baf8d4f2f81c6ff9b134b8f9e1c06cb6", "branch_name": "refs/heads/master", "committer_date": 1573674631000, "content_id": "06cba3cf88cef9792205280cbfcd335c273c0fda", "detected_licenses": [ "MIT" ], "directory_id": "dbb5f45fa1c0b80991c74b9ec213b169daa1f903", "extension": "py", "fi...
2.5625
stackv2
"""sefsef""" from flask import jsonify, request, g from ..utils.auth import requires_auth from ..utils.db_handler import get_user_with_email, insert_user_to_db from ..utils.db_handler import update_user, get_user_with_id, get_posts_from_user from ..utils.db_handler import update_user_profile_picture, update_following_...
99
31.56
87
17
770
python
[{"finding_id": "codeql_py/stack-trace-exposure_bd71f4c7eb2523ad_a54a59e4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 81 ]
[ null ]
[ 30 ]
[ 82 ]
2024-11-19T01:37:58.470421+00:00
1,628,759,471,000
6ff938782c9c5b4a91e6384b3a8e32b7bfad5e5a
2
{ "blob_id": "6ff938782c9c5b4a91e6384b3a8e32b7bfad5e5a", "branch_name": "refs/heads/master", "committer_date": 1628759471000, "content_id": "a4239f29f0fa8663071b76e0e1259309bbc3bee5", "detected_licenses": [ "MIT" ], "directory_id": "e9643aa4c370c70a49c929a87adbd8dfd923c013", "extension": "py", "fi...
2.4375
stackv2
# -*- coding: utf-8 -* import hmac import base64 import time import hashlib import os import sys import pika class AliyunCredentialsProvider: """ Python2.7适用,根据阿里云的 accessKey,accessSecret,UID算出amqp连接使用的username和password UID是资源ownerID,一般是接入点第一段 """ ACCESS_FROM_USER = 0 def __init__(self, access...
31
27.42
86
17
265
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0484d92fc874a444_a4a3e567", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 28 ]
[ null ]
[ 39 ]
[ 72 ]
2024-11-19T01:38:26.794876+00:00
1,620,770,057,000
0e895e84cbbf62619e911540513ce7001f08fcd0
3
{ "blob_id": "0e895e84cbbf62619e911540513ce7001f08fcd0", "branch_name": "refs/heads/master", "committer_date": 1620770057000, "content_id": "e35461e2d0f9474d72de074480f7b4698ef792ac", "detected_licenses": [ "MIT" ], "directory_id": "d1c26002aa079500c72cce41f4568c0efa5a83ec", "extension": "py", "fi...
2.609375
stackv2
import aiohttp import asyncio import argparse import json import yaml from .api import APOD from ..errors import ArgumentError from ..utils import date_strptime __doc__ = """ CLI TOOL FOR APOD API WRAPPER """ VALID_FILE_TYPES = ['csv', 'json', 'yaml'] parser = argparse.ArgumentParser(description="CLI tool for...
182
32.35
166
16
1,390
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3114d1d3b1b9ccfe_908ee162", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://apod.nasa.gov](1) may be at an arbitrary positi...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [http://apod.nasa.gov](1) may be at an arbitrary position in the sanitized URL.", "The string [https://apod.nasa.gov](1) may be at an arbitrary position in the sanitized URL." ]
[ 129, 129 ]
[ null, null ]
[ 8, 50 ]
[ 46, 89 ]
2024-11-19T01:51:55.615124+00:00
1,513,070,645,000
9113b707c7694ec5880b49e04f13f511c5194808
2
{ "blob_id": "9113b707c7694ec5880b49e04f13f511c5194808", "branch_name": "refs/heads/master", "committer_date": 1513070645000, "content_id": "f8790ca2cb0ec6ba39e4e8c0e944aa4a5d4ae1e8", "detected_licenses": [ "MIT" ], "directory_id": "92aafa467ce94ab20bfedf8c429b890951177946", "extension": "py", "fi...
2.328125
stackv2
""" Routes and views for the flask application. """ import jsonpickle import simplejson as json from flask import jsonify from flask import request from datetime import datetime from Interface import app, logmgr, constants from langintent import intentanalyzer import shutil @app.route('/api/int/define/<objtype>', met...
110
28.48
88
16
758
python
[{"finding_id": "codeql_py/stack-trace-exposure_299b81488a6400a2_dbdbadaf", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
6
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-022" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 40, 61, 80, 92, 110, 53 ]
[ null, null, null, null, null, null ]
[ 20, 20, 20, 20, 20, 27 ]
[ 60, 60, 78, 60, 78, 70 ]
2024-11-19T02:04:29.635476+00:00
1,612,090,319,000
4d042b9a8842840bbc259342f182506cad411d4a
3
{ "blob_id": "4d042b9a8842840bbc259342f182506cad411d4a", "branch_name": "refs/heads/master", "committer_date": 1612090319000, "content_id": "19763185d7b18de3b34c63f484247cad579a2010", "detected_licenses": [ "MIT" ], "directory_id": "53086fd7d0690f1602d62436275cf9ddb7617499", "extension": "py", "fi...
2.859375
stackv2
import os import re import string import hazm import matplotlib.pyplot as plt import pandas as pd import plotly.express as px import plotly.graph_objects as go import streamlit as st from PIL import Image from streamlit import caching from wordcloud import STOPWORDS from wordcloud_fa import WordCloudFa from preproces...
264
37.22
176
20
2,445
python
[{"finding_id": "codeql_py/overly-large-range_9762f04adf40137d_6a28a986", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 93, 205 ]
[ null, null ]
[ 55, 55 ]
[ 58, 58 ]
2024-11-19T02:04:40.992414+00:00
1,618,933,436,000
248f2594647be25c690d975e9b58349a4cf90b2d
2
{ "blob_id": "248f2594647be25c690d975e9b58349a4cf90b2d", "branch_name": "refs/heads/main", "committer_date": 1618933446000, "content_id": "c9aee733894a62bec53cb6b5cf2648b450a7d982", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2277573df4a9e16678c00d8a62cbf1538e8d4bb6", "extension": "py", ...
2.40625
stackv2
import jinja2 import logging import os import socket import time import uuid import zmq import zmq.auth from zmq.auth.thread import ThreadAuthenticator import director class Interface(director.Processor): """The Interface class. This class defines everything required to connect to or from a given serve...
401
31.7
79
22
2,601
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d7a22984c260bf92_fb19c05f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 72 ]
[ null ]
[ 25 ]
[ 71 ]
2024-11-19T02:04:41.214178+00:00
1,576,198,712,000
ed697432da24e34553dba071506f0ede2261d13b
2
{ "blob_id": "ed697432da24e34553dba071506f0ede2261d13b", "branch_name": "refs/heads/master", "committer_date": 1576198712000, "content_id": "92e61035f855e0102545c936dddd8824278500cd", "detected_licenses": [ "MIT" ], "directory_id": "df359938dbab2882a3f5857aad898173f573a404", "extension": "py", "fi...
2.5
stackv2
""" This is basically a simple HTTP server that can handle a few upload requests from PhysViz apps. Particularly, saving bookmarks. """ import SimpleHTTPServer import SocketServer import urlparse import shutil import json import sys, time sys.path.append("scripts") import ImageTweets ImageTweets.IMAGE_DIR = "images/tw...
136
30.24
73
15
1,018
python
[{"finding_id": "codeql_py/path-injection_97fb84b44684ef73_ca556ad6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)." ]
[ 81, 81 ]
[ null, null ]
[ 29, 35 ]
[ 33, 46 ]
2024-11-19T02:04:59.139522+00:00
1,669,023,884,000
82b49dce3ff262b27f3acdc9e7872ddc6fce2c0a
2
{ "blob_id": "82b49dce3ff262b27f3acdc9e7872ddc6fce2c0a", "branch_name": "refs/heads/master", "committer_date": 1669023884000, "content_id": "1f6f9543b04561fc64ca785d6997dccf816e1444", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7e3fc8f3f4746f5669d852e61b8e95dcf09d0c2f", "extension": "py"...
2.46875
stackv2
""" File containing some utility functions that wrap around various repeatedly used logic """ # stdlib import atexit import logging import os import subprocess from collections import deque from json import JSONEncoder from typing import Any, Deque, Dict, Iterable, Optional, Tuple # lib import jinja2 import netaddr fro...
263
34.08
119
17
2,090
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0fab4a587ccb71b0_2ec0d110", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 38 ]
[ 41 ]
[ 13 ]
[ 2 ]
2024-11-19T02:28:14.297723+00:00
1,556,951,844,000
98bdcbc6257d14c745d934f94d787e432054a888
2
{ "blob_id": "98bdcbc6257d14c745d934f94d787e432054a888", "branch_name": "refs/heads/master", "committer_date": 1556951844000, "content_id": "c003b32f3f75190887a892dd8f1e2973045d651d", "detected_licenses": [ "MIT" ], "directory_id": "a351f3aaad20b2e4706621e9c8ae5857680e4ff4", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- import os import time import urllib.parse import urllib.request import hashlib import base64 import uuid import wave import requests import urllib import json app_id = 'xxx', app_key='xxx' url = 'https://api.ai.qq.com/fcgi-bin/aai/aai_wxasrlong' #我们自己的阿里云服务器的地址开了8322端口,来跑我的tornado服务 callbac...
140
20.61
76
13
861
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_172456d96037bad4_3bc07f26", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 28 ]
[ null ]
[ 15 ]
[ 37 ]
2024-11-19T02:28:51.929487+00:00
1,567,207,134,000
7b8d8ae46665c8eaab5e696eb7127491ecef1cef
3
{ "blob_id": "7b8d8ae46665c8eaab5e696eb7127491ecef1cef", "branch_name": "refs/heads/master", "committer_date": 1567207134000, "content_id": "65e7e98bd620e42d94e2716f2a823a11958ac935", "detected_licenses": [ "MIT" ], "directory_id": "1b981f2f96188b681a7dd2d06744727a11db66c6", "extension": "py", "fi...
2.609375
stackv2
import argparse from datetime import datetime import logging import os from shutil import copyfile import re import dateutil.parser import jinja2 import markdown from slugify import slugify import yaml #################### # Global Constants #################### VERSION = "0.1.1" CONTENT_SEPARATOR = '==========' GE...
374
25.97
107
14
2,376
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_12e4839e49b0c8ef_f3e6ed08", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32 ]
[ null ]
[ 7 ]
[ 45 ]
2024-11-19T02:37:16.700651+00:00
1,519,309,181,000
b9bf69220de72204ed449f7abb175983d7c87941
2
{ "blob_id": "b9bf69220de72204ed449f7abb175983d7c87941", "branch_name": "refs/heads/master", "committer_date": 1519309181000, "content_id": "b46f8b42cd41237fafd088469fd80e4d78d3cc96", "detected_licenses": [ "MIT" ], "directory_id": "9313be867e0c5873c92c999d0e3fdd8d2f29dfcb", "extension": "py", "fi...
2.484375
stackv2
from rest_framework.views import APIView from rest_framework.response import Response from rest_framework import status from endpoints.utils.decorators import room_required, pk_required from player.serializers import RoomSerializer class RoomView(APIView): """ Room resource. """ @room_required d...
85
29.01
105
17
513
python
[{"finding_id": "codeql_py/stack-trace-exposure_255acab790a715a4_1df373bb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 49 ]
[ null ]
[ 33 ]
[ 41 ]
2024-11-19T02:37:40.131791+00:00
1,673,096,881,000
dde2b59451846a5a9a05b9004d9c2fb76f332476
4
{ "blob_id": "dde2b59451846a5a9a05b9004d9c2fb76f332476", "branch_name": "refs/heads/master", "committer_date": 1673096881000, "content_id": "62298514aaa5d3bf63c3e27f41a704141d298d28", "detected_licenses": [ "MIT" ], "directory_id": "86e14249e8fc83789001413d146f72cb706e7e96", "extension": "py", "fi...
3.625
stackv2
#!/usr/bin/env python3 """Advent of Code 2015, Day 4: The Ideal Stocking Stuffer""" import hashlib import aoc import pytest def suffix_for_md5_prefix(secret_key, char="0", length=5, starting_integer=1): """Return the first integer suffix to secret_key that produces wanted hash The wanted hash is expected t...
55
27.95
78
14
403
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3fc63bf65eec3807_07cdb94d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 26 ]
[ null ]
[ 32 ]
[ 51 ]
2024-11-19T02:37:47.108644+00:00
1,551,427,138,000
5cabead0ae2e39fdcf6f7acba98da53c6abbb7db
3
{ "blob_id": "5cabead0ae2e39fdcf6f7acba98da53c6abbb7db", "branch_name": "refs/heads/master", "committer_date": 1551427138000, "content_id": "9f7dc202fa2731344e24e9fb97f52310c67f6b99", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "982b08e9cecde996cff416fbb9bf87eb59cf6e89", "extension": "p...
2.515625
stackv2
#!/usr/bin/python from paramiko import RSAKey from paramiko import SSHClient from paramiko import AutoAddPolicy import sys """ get buffered stream of input from the client channel while the worker.sh script executes """ def line_buffered(f): line_buf = "" while not f.channel.exit_status_ready(): line_...
38
22.16
88
12
214
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a7d5d4f46d7b1130_0124ccc9", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 29 ]
[ null ]
[ null ]
[ 52 ]
2024-11-19T02:49:09.478506+00:00
1,554,375,552,000
a17fb062079479beec7b4ffa35385d890893540e
3
{ "blob_id": "a17fb062079479beec7b4ffa35385d890893540e", "branch_name": "refs/heads/master", "committer_date": 1554375552000, "content_id": "10c7d4ed16c7e8ac99d0cfe77b29f96ae54d0213", "detected_licenses": [ "MIT" ], "directory_id": "ee0b5487e07276d78aeaa463445beac1eeb9705d", "extension": "py", "fi...
3.25
stackv2
#!/usr/bin/python # written by Heiko 11.02.2019 import base64, subprocess strPassword='8yaThaDCTGHxG8fu' ########################################################## print ('Password: ' + strPassword) print ('') ########################################################## ## Using base64 ## Function to encrypt password...
50
36.22
160
12
486
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_791bdc446af0b8c7_7c1b6c16", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive dat...
[ 9, 23, 26, 46, 47 ]
[ null, null, null, null, null ]
[ 8, 8, 8, 7, 7 ]
[ 34, 52, 52, 53, 67 ]
2024-11-19T02:49:18.961011+00:00
1,569,523,009,000
520d8bd68dad923d0c28605a4c32df037f20a3ed
2
{ "blob_id": "520d8bd68dad923d0c28605a4c32df037f20a3ed", "branch_name": "refs/heads/master", "committer_date": 1569523009000, "content_id": "cd291e0b55bbddc0dfe6b9e3bf50ae10ec573158", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e8fd56058da5d4be57711058f6092adda171c51d", "extension": "py"...
2.359375
stackv2
import requests from flask import request, Response excluded_headers = [ 'content-encoding', 'content-length', 'transfer-encoding', 'connection'] def request_headers(): return {key: value for (key, value) in request.headers if key != 'Host'} def proxy_request(url): return requests.request(...
42
21.93
76
11
200
python
[{"finding_id": "codeql_py/request-without-cert-validation_f082ab87b1cbfd5c_475926d9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 17 ]
[ 24 ]
[ 12 ]
[ 22 ]
2024-11-19T02:49:26.551511+00:00
1,390,338,056,000
5063ad4e185913e1bbd68788dabb65c281c370a3
3
{ "blob_id": "5063ad4e185913e1bbd68788dabb65c281c370a3", "branch_name": "refs/heads/master", "committer_date": 1390338056000, "content_id": "ce373fc75979a00fafb5bd463e6cc75226c98235", "detected_licenses": [ "Apache-2.0", "BSD-3-Clause" ], "directory_id": "acbcaf051f0bf60618ea310afaaf6de2a751920b",...
2.546875
stackv2
#!/usr/bin/python # Programmer: Chris Bunch (chris@appscale.com) # pylint: disable-msg=E1101 # a script that receives xmpp messages for an app engine app # and forwards them to the app, which must have a route # exposed at /_ah/xmpp/message/chat/ to receive them # usage is ./xmpp_receiver.py appname login_ip app-pass...
181
34.23
80
19
1,517
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5dbb938dc2aeaa13_e9a10288", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 149 ]
[ 150 ]
[ 20 ]
[ 50 ]
2024-11-19T03:00:12.693588+00:00
1,254,678,499,000
f667fc5d422e58bbfe30350c4b5d817dceb24ef7
2
{ "blob_id": "f667fc5d422e58bbfe30350c4b5d817dceb24ef7", "branch_name": "refs/heads/master", "committer_date": 1254678499000, "content_id": "ad0f6004381121912f910af7a55e3d128d308f68", "detected_licenses": [ "MIT" ], "directory_id": "cc533c1a9aaea87e2a936566ee23d9e5f21217c0", "extension": "py", "fi...
2.484375
stackv2
# encoding: utf-8 """ Implements a storage driver that saves recordings via SFTP. """ from __future__ import with_statement from permanence.config import ConfigurationError from permanence.event import EventSource from permanence.storage.util import ActionQueue, compile_path_pattern import paramiko import os.path i...
101
31.33
78
17
683
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_11ce4aa8d1333bde_a1eeb678", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 61 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-19T03:00:30.508424+00:00
1,564,559,554,000
1f1c81a45490456cad7d627e16471c96069be27f
3
{ "blob_id": "1f1c81a45490456cad7d627e16471c96069be27f", "branch_name": "refs/heads/master", "committer_date": 1564559554000, "content_id": "c27917efec80551b6a9fd5535a6d03df8bc3426b", "detected_licenses": [ "MIT" ], "directory_id": "7035e9bfbeb6a312af43cbf2dac7ca292ac9d882", "extension": "py", "fi...
2.875
stackv2
""" Main application and routing logic for Twitoff """ from flask import Flask, request, jsonify from flask_restplus import Api, Resource, fields # Define the Application as a Flask App app = Flask(__name__) # Use Api to intialize the application. # app = Api( # app=flask_app, # version='0.1', # title='...
52
22.46
77
15
278
python
[{"finding_id": "codeql_py/stack-trace-exposure_3043481b518ee8e3_9f874449", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 46 ]
[ 48 ]
[ 13 ]
[ 33 ]
2024-11-19T03:11:23.750560+00:00
1,594,123,255,000
7d3eb21cbf7af016916e582a98acfc98f150e2a7
3
{ "blob_id": "7d3eb21cbf7af016916e582a98acfc98f150e2a7", "branch_name": "refs/heads/master", "committer_date": 1594123255000, "content_id": "035e90798da5445120c53d062e076539ce5ca03e", "detected_licenses": [ "MIT" ], "directory_id": "f2cf24086635373a31717c68cd43bd5c83b18a08", "extension": "py", "fi...
2.640625
stackv2
import os import errno import tarfile from PIL import Image from torch.utils.data import Dataset from .utils import DEFAULT_PATH class ImageNet32Dataset(Dataset): urls = [ 'http://image-net.org/small/train_32x32.tar', 'http://image-net.org/small/valid_32x32.tar' ] raw_folder = 'imagenet32...
111
29.57
126
16
732
python
[{"finding_id": "codeql_py/tarslip_032641124214dc28_36c9e59d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 105, 110 ]
[ null, null ]
[ 9, 9 ]
[ 12, 12 ]
2024-11-19T03:11:27.267402+00:00
1,620,404,944,000
9e831d6b13f9fd407ea89832473fd4f802433300
2
{ "blob_id": "9e831d6b13f9fd407ea89832473fd4f802433300", "branch_name": "refs/heads/master", "committer_date": 1620404944000, "content_id": "17f0180027c77e5e48ba83c16b06dc2727e9cc5f", "detected_licenses": [ "CC0-1.0" ], "directory_id": "129c10d5374c9fb8574ca75d062f6684c54fee89", "extension": "py", ...
2.46875
stackv2
import logging from flask import request, make_response from os import getenv from sys import stderr, stdout from requests import get, post from json import dumps TASK_HOST = getenv('TASK_HOST') class WorkflowHandler: def __init__(self): pass def get(self, job_id, task_name): ''' ...
119
43.92
150
18
1,143
python
[{"finding_id": "codeql_py/partial-ssrf_4575933c6f3edb8b_26fb0be0", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
4
true
[ "CWE-918", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/partial-ssrf", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 87, 79, 86, 99 ]
[ null, null, null, null ]
[ 29, 26, 28, 67 ]
[ 151, 102, 57, 92 ]
2024-11-19T03:11:30.119973+00:00
1,543,605,640,000
15216b98c71750801be534e040198907f14e03dd
3
{ "blob_id": "15216b98c71750801be534e040198907f14e03dd", "branch_name": "refs/heads/master", "committer_date": 1543605640000, "content_id": "4fae6b6c02e19bb9f253bf7942bf2dcff87266df", "detected_licenses": [ "MIT" ], "directory_id": "b268646cbbc22f97186bf4fdc6d615d0b4e42be7", "extension": "py", "fi...
3.171875
stackv2
#! user/bin/pycharmPoject import numpy as np # segment text def text_segment(large_string): """ Desc: Receive a large string and segment it to a string list :param large_string: :return: String list and turn all string into lower case """ import re clean_string = re.compile(r'[^a-zA-z]|...
114
29.21
112
17
904
python
[{"finding_id": "codeql_py/overly-large-range_344e8779f99bf886_3176a596", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 16 ]
[ null ]
[ 38 ]
[ 41 ]
2024-11-19T03:12:15.001298+00:00
1,617,998,997,000
c61280fdf851c990e803ca2abbb590f9b1d6e28a
3
{ "blob_id": "c61280fdf851c990e803ca2abbb590f9b1d6e28a", "branch_name": "refs/heads/main", "committer_date": 1617998997000, "content_id": "58ca0cb64c99e5a19ae74cbff3239146f9efb609", "detected_licenses": [ "MIT" ], "directory_id": "5aec9b30005a8a5cc39da3c46ce65aa3e6710cfe", "extension": "py", "file...
2.734375
stackv2
""" security.py Contains code which manages access to API routes """ import logging from functools import wraps from flask import request, g from errors import BadRequestException, AccessDeniedException from groups import group_role_map logger = logging.getLogger(__name__) def admin_only(f): """ Decorator which...
69
31.12
95
19
483
python
[{"finding_id": "codeql_py/log-injection_43036417c33150a2_88fc4ce8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 47, 52 ]
[ null, null ]
[ 67, 21 ]
[ 95, 52 ]
2024-11-19T03:12:17.897426+00:00
1,637,470,777,000
5dccd40f5e5e56c490ae2df64b384a304401325f
3
{ "blob_id": "5dccd40f5e5e56c490ae2df64b384a304401325f", "branch_name": "refs/heads/master", "committer_date": 1637470777000, "content_id": "1426047a07617b6223c1643c48eb7bb1d3dca034", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c2f34328a1d9dd3de7b263a2f69dcef105403c84", "extension": "p...
2.84375
stackv2
# External Dependencies import gatt import queue import time import threading # Internal Dependencies from pyroot import RootPhy class RootGATT(RootPhy): root_identifier_uuid = '48c5d828-ac2a-442d-97a3-0c9822b04979' def __init__(self, name = None, dev = 'hci0', wait_for_connect = True): """Sets up Bl...
141
34.62
89
14
1,146
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6b335beab10d8ce8_b46d9b01", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive...
[ 85, 110, 114, 119, 123 ]
[ null, null, null, null, null ]
[ 15, 15, 15, 15, 15 ]
[ 75, 52, 76, 55, 60 ]
2024-11-19T03:12:21.035773+00:00
1,595,950,136,000
b93b9a009c3749f7a930d7ff3f036d48dfad6d91
3
{ "blob_id": "b93b9a009c3749f7a930d7ff3f036d48dfad6d91", "branch_name": "refs/heads/master", "committer_date": 1595950136000, "content_id": "2270bc20889200d49d2bde986d7e0b4bfa322e06", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5206601591debaaccbca77ca0a4825de4899d546", "extension": "py"...
3.171875
stackv2
import sys import os import random import base64 from Crypto.Cipher import AES from Crypto import Random # importing the password based key distribution function, give more security from Crypto.Protocol.KDF import PBKDF2 #imporing hash function for key generation import hashlib class AESCipher(): BLOCK_SIZE = 1...
75
30.41
87
17
551
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b24f4a800be500d9_abe6274d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 28 ]
[ null ]
[ 28 ]
[ 50 ]
2024-11-19T03:12:22.130639+00:00
1,538,368,687,000
034e47bca784c2cdc59aa082aa22fca77d0ebacf
3
{ "blob_id": "034e47bca784c2cdc59aa082aa22fca77d0ebacf", "branch_name": "refs/heads/master", "committer_date": 1538368687000, "content_id": "334cd7f957c3b36ab15171c9c7b606d413c03733", "detected_licenses": [ "MIT" ], "directory_id": "26bdee774436202fe697e0bf036bb9ce26a20313", "extension": "py", "fi...
2.765625
stackv2
""" Utility functions for extracting data for slicing analysis from MORF. Eventually these functions should be incoprorated into MORF API or another public utilities package. """ import os import subprocess import tarfile import shutil import gzip import re DATABASE_NAME = "course" def extract_id_lookup_table(o...
143
34.27
125
16
1,211
python
[{"finding_id": "codeql_py/tarslip_13eb34cab94fad48_27f1f66b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 44 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T03:12:38.738897+00:00
1,525,725,512,000
7304dd51c16f244110c2576179756f1b5e5e0b69
3
{ "blob_id": "7304dd51c16f244110c2576179756f1b5e5e0b69", "branch_name": "refs/heads/master", "committer_date": 1525725512000, "content_id": "b94e035814e540595cf65991330da9b059cbcc88", "detected_licenses": [ "MIT" ], "directory_id": "a6a49ab6abff0559b2254968a0086e3532e9d5d9", "extension": "py", "fi...
2.6875
stackv2
# Running from bash with flask: # # FLASK_APP=patrec.py FLASK_DEBUG=1 flask run from flask import Flask, request, render_template import configparser import logging import requests app = Flask(__name__) config = configparser.ConfigParser() config.read('wsgi_apps.conf') API_URL_BARCODE = config['patrec']['api_url_ba...
53
28.94
75
14
406
python
[{"finding_id": "codeql_py/partial-ssrf_e4bb43289bcdd99b_33858a1f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-117" ]
[ "py/partial-ssrf", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 48, 40 ]
[ null, 41 ]
[ 9, 22 ]
[ 57, 52 ]
2024-11-19T03:25:19.819867+00:00
1,567,350,963,000
62bafa0fe4a8e69cff3f997d05763c7d751a30db
3
{ "blob_id": "62bafa0fe4a8e69cff3f997d05763c7d751a30db", "branch_name": "refs/heads/master", "committer_date": 1567350963000, "content_id": "7b1ed4980f43898512950d10dbe0314bf21ed6b8", "detected_licenses": [ "MIT" ], "directory_id": "43225843505acbf4c1b6f088f35498b3928cc647", "extension": "py", "fi...
2.75
stackv2
"""" Main file & entrypoint for project In charge of loading configuration, parsing command line arguments, and then performing the required actions: - run configuration utility - do a test run - start webhook listener """ import os, yaml, argparse, logging, sys, json from flask import Flask, jsonify, request from queu...
185
35
98
19
1,430
python
[{"finding_id": "codeql_py/log-injection_57fce1648a97e0a1_0ebc8c7e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 112 ]
[ null ]
[ 75 ]
[ 79 ]
2024-11-19T03:25:23.422707+00:00
1,616,855,018,000
47fe98ea7c017601fd77bf4be9e0cd1aedebdf25
3
{ "blob_id": "47fe98ea7c017601fd77bf4be9e0cd1aedebdf25", "branch_name": "refs/heads/master", "committer_date": 1616855018000, "content_id": "8845c0a5e35bc68923ff833fa93979fc96cb8d1a", "detected_licenses": [ "MIT" ], "directory_id": "f1f67e7cfc47eea274dfd5b8c9f14b65016590a5", "extension": "py", "fi...
3.078125
stackv2
# -------------- file = open(file_path, 'r') sentence = print(file.readline()) file.close() file = open(file_path_1,'r') message_1 = print(file.readline()) file = open (file_path_2,'r') message_2 = print (file.readline()) def fuse_msg(message_a, message_b): quotient = (int(message_b)//int(message_a)) return ...
66
25.76
79
11
502
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_2e2422f4f3e21ff2_c67910d5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive d...
[ 62, 14, 28, 44, 56, 64 ]
[ null, null, null, null, null, null ]
[ 12, 7, 7, 7, 7, 7 ]
[ 22, 19, 19, 19, 19, 17 ]
2024-11-19T03:25:35.860227+00:00
1,647,244,940,000
94e9425defe7f5ca656b7292567021e75a9ada9b
2
{ "blob_id": "94e9425defe7f5ca656b7292567021e75a9ada9b", "branch_name": "refs/heads/master", "committer_date": 1647244940000, "content_id": "bc325c4b1cad75b9480cb95f145e4a4f33d35472", "detected_licenses": [ "MIT" ], "directory_id": "f75f841a1e0e6e7915a68bebbed7233aa5d22625", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python import sys, paramiko if len(sys.argv) < 5: print "args missing" sys.exit(1) hostname = sys.argv[1] username = sys.argv[2] password = sys.argv[3] command = sys.argv[4] port = 22 try: client = paramiko.SSHClient() client.load_system_host_keys() client.set_missing_host_key_po...
27
19.04
77
9
135
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ba353034585e3fdb_ea812fe6", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to WarningPolicy may be unsafe." ]
[ 19 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-19T03:25:36.914458+00:00
1,619,873,884,000
c53765fd5e00c6f7d41e8da8eb367f760a5c9847
3
{ "blob_id": "c53765fd5e00c6f7d41e8da8eb367f760a5c9847", "branch_name": "refs/heads/main", "committer_date": 1619873884000, "content_id": "fb50653f6961ed1cc13870328f59feee67449226", "detected_licenses": [ "MIT" ], "directory_id": "e05b2e46e6c7008fada8db11ad2974cd434eec0f", "extension": "py", "file...
2.546875
stackv2
import os import time import environ from jinja2 import Environment, FileSystemLoader from utils import ( check_availability, send_mail, format_json_data, get_date ) # reading .env file env = environ.Env() environ.Env.read_env() BASE_DIR = os.path.join(os.path.dirname(__file__), '.') TEMPLATES_DIR = os.path.joi...
60
26.83
78
15
391
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b12eebfd489ef2c7_68a34bce", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 41 ]
[ null ]
[ 28 ]
[ 79 ]
2024-11-19T03:25:37.449737+00:00
1,502,384,436,000
c0b7d87b9b2c799738dfd676fdda691b4bc848d5
3
{ "blob_id": "c0b7d87b9b2c799738dfd676fdda691b4bc848d5", "branch_name": "refs/heads/master", "committer_date": 1502384436000, "content_id": "d33e4472fb5cbcf7c3a6e9ae96d925c784c753bf", "detected_licenses": [ "MIT" ], "directory_id": "106db0372588b6193fc42c38b82c2dda723d9abf", "extension": "py", "fi...
2.921875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Show the content of a simtel event. """ import argparse import numpy as np import sys import ctapipe from ctapipe.io.hessio import hessio_event_source def recursive_print(var, level=0): pre = 3 * level * " " try: for k, v in var.items(): ...
90
30.14
106
19
617
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c598ffdcec6872d_d7a3dce1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 53 ]
[ null ]
[ 15 ]
[ 90 ]
2024-11-19T03:35:43.146107+00:00
1,584,498,071,000
c857ffaf63ec2bc08755bf3666c05fc5956a24dc
2
{ "blob_id": "c857ffaf63ec2bc08755bf3666c05fc5956a24dc", "branch_name": "refs/heads/master", "committer_date": 1584498071000, "content_id": "242c4e61fce308ec1336840cf620e81ed6427513", "detected_licenses": [ "MIT" ], "directory_id": "5b8bcae34a16438b315030f1fa3c7841918f2135", "extension": "py", "fi...
2.484375
stackv2
# CreateApiGenerator.py - Creates an object representing a create API import os from jinja2 import Environment, Template, FileSystemLoader import yaml from smoacks.sconfig import sconfig from smoacks.Schema import scr_schemas class OpenapiGenerator: def __init__(self, app_object): self._app_object = app_ob...
54
43.69
132
17
543
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1351978de32172e0_86858440", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 47 ]
[ 49 ]
[ 15 ]
[ 10 ]
2024-11-19T03:35:57.538653+00:00
1,613,845,418,000
d17a3e1636541678a0c10dfbbb94e5ff9ff284f4
3
{ "blob_id": "d17a3e1636541678a0c10dfbbb94e5ff9ff284f4", "branch_name": "refs/heads/main", "committer_date": 1613845418000, "content_id": "aaa96ee0c19bbbc4743a5eab28c355ba4326df0b", "detected_licenses": [ "MIT" ], "directory_id": "cce3a4eec24400763f82d956968572a737053401", "extension": "py", "file...
2.953125
stackv2
import requests import json import matplotlib.pyplot as plt import pandas as pd import os import errno from datetime import date import pprint #script to chart different metrics of OC data from def main(): apiKey = "0d0c18e9f6894a898708e30eb617ac66" #fips for Orange County, CA fips = "06059" #current data f...
88
27.68
116
18
742
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_62398e68d749dea6_25e8d5df", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 43 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-19T03:36:02.863225+00:00
1,437,513,366,000
9f38bb1f1d55a0e52a81f752b645d3a0704ec88d
3
{ "blob_id": "9f38bb1f1d55a0e52a81f752b645d3a0704ec88d", "branch_name": "refs/heads/master", "committer_date": 1437513366000, "content_id": "94e601a525f34d42481e3e29e38acb1ce6990afc", "detected_licenses": [ "MIT" ], "directory_id": "e095634d542cb3038d85432a4fcb043b66a3f294", "extension": "py", "fi...
2.703125
stackv2
import tarfile from buildall import Task, Path class Decompress(Task): def __init__(self, decompressed): self._decompressed = decompressed def target(self): return Path(self._decompressed) def build(self, compressed): self.debug('Decompressing %s to %s' % (compressed, ...
19
29.53
67
17
124
python
[{"finding_id": "codeql_py/tarslip_1327278a7b752cba_cf4b7e6c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 17 ]
[ null ]
[ 13 ]
[ 14 ]
2024-11-19T01:28:37.292900+00:00
1,639,583,586,000
69d6e9da7bf8e4e5085ed8211f148556bc766e34
3
{ "blob_id": "69d6e9da7bf8e4e5085ed8211f148556bc766e34", "branch_name": "refs/heads/master", "committer_date": 1639583586000, "content_id": "2b562fa5bc35d593606bf9a301c04f10a8fb0160", "detected_licenses": [ "MIT", "BSD-3-Clause" ], "directory_id": "626fca5633d45584afbd7e9e10bd33d57d90e041", "ext...
2.8125
stackv2
from flask import Blueprint, render_template from smartlight import animation_thread from smartlight.utils import error_to_json import json main = Blueprint('main', __name__) @main.route('/') def index(): """ Control for the index/main page :return: html response with main page """ return rend...
139
26.15
99
12
900
python
[{"finding_id": "codeql_py/reflective-xss_244ef1883246f37c_a0b342f6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vu...
[ 32, 46, 63 ]
[ null, null, null ]
[ 12, 12, 12 ]
[ 80, 80, 65 ]
2024-11-19T01:28:45.284195+00:00
1,597,869,968,000
e441129f420e51c7a559bdb039e851b99da79053
3
{ "blob_id": "e441129f420e51c7a559bdb039e851b99da79053", "branch_name": "refs/heads/master", "committer_date": 1597869968000, "content_id": "e499f62a7265b5385c069b22b495fdf2d23704b3", "detected_licenses": [ "MIT" ], "directory_id": "dda4e5f66c23c055ea0e500aa4577b397d3eb104", "extension": "py", "fi...
3
stackv2
# Author: Stan Fortoński # Date: 02.05.2020 # Login To Google from time import sleep from selenium.webdriver.common.keys import Keys from tinder.config import Config class GoogleLogin: def __init__(self, driver): self.driver = driver self.login = Config['google']['login'] self.password = C...
30
33.2
131
12
236
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3af8fbd542327ae5_fa5ebd26", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [myaccount.google.com](1) may be at an arbitrary positi...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [myaccount.google.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 27 ]
[ null ]
[ 27 ]
[ 71 ]
2024-11-19T01:28:50.695367+00:00
1,580,310,761,000
bbbbd1683f4fa8ddc8933e6a8eee26c6b060d30b
2
{ "blob_id": "bbbbd1683f4fa8ddc8933e6a8eee26c6b060d30b", "branch_name": "refs/heads/master", "committer_date": 1580310761000, "content_id": "cdbea4a0f4fd3baeba43f3208d027fbed4b24c67", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "15a9937437fff9ef921547f067647a1c638ad2ed", "extension": "p...
2.40625
stackv2
from __future__ import print_function import os import json from docserver.utils import logger, log_exception from flask import abort from flask import Flask from flask import redirect from flask import render_template from flask import request from tempfile import TemporaryDirectory from shutil import copyfileobj #...
85
30.91
115
18
594
python
[{"finding_id": "codeql_py/reflective-xss_d65ffad284518a1c_434c9196", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-601", "CWE-022" ]
[ "py/reflective-xss", "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 78, 57, 69 ]
[ null, null, null ]
[ 20, 25, 27 ]
[ 28, 36, 41 ]
2024-11-19T01:29:00.494365+00:00
1,598,604,206,000
b149b43debeaa5c0017c3b0c7861fd8071579424
2
{ "blob_id": "b149b43debeaa5c0017c3b0c7861fd8071579424", "branch_name": "refs/heads/master", "committer_date": 1598604206000, "content_id": "7050893e00a9b4c9c9c7580463b84b1570989615", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8123a62a440070fa3bae564d4b4e847da86830b4", "extension": "py"...
2.421875
stackv2
import os from flask import Blueprint,render_template,redirect,url_for,flash,request,current_app from apps.models import User from apps.forms import RegisterForm,LoginForm,UploadForm from apps.exts import db from apps.email import send_mail from flask_login import login_user,logout_user,login_required,current_user from...
113
30.88
97
17
913
python
[{"finding_id": "codeql_py/url-redirection_68ff5cede627716c_9f985cef", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-19T01:29:01.004983+00:00
1,604,610,460,000
2f2030672fa8c3300ea6f9907cc7daabf443afed
3
{ "blob_id": "2f2030672fa8c3300ea6f9907cc7daabf443afed", "branch_name": "refs/heads/main", "committer_date": 1604610460000, "content_id": "fc62cfff5f7551f3b013a682a2236854a510a2a8", "detected_licenses": [ "MIT" ], "directory_id": "5a5d5a76a14b0427148435a35adde137f5cb6ac6", "extension": "py", "file...
3.078125
stackv2
import os import sys import hashlib ###### input = "abbhdwsy" password = "" password2 = ["*"] * 8 free_index = [str(i) for i in range(8)] ###### if __name__ == "__main__": i = 0 while True: hash_md5 = hashlib.md5((input + str(i)).encode()).hexdigest() if hash_md5[:5] == "00000": pa...
26
25.5
69
18
196
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_29d89aa5c783e2da_1667aea8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 24, 25 ]
[ null, null ]
[ 11, 11 ]
[ 47, 54 ]
2024-11-19T01:29:06.897545+00:00
1,587,458,979,000
1bac52d55f74e7d21fd00924f30c87a42dc37586
2
{ "blob_id": "1bac52d55f74e7d21fd00924f30c87a42dc37586", "branch_name": "refs/heads/master", "committer_date": 1587458979000, "content_id": "b86419a8da24e5f39083a6effb8dedbcdae957d5", "detected_licenses": [ "MIT" ], "directory_id": "c545158ffada192208a8ca8bb15ab9349f143c1b", "extension": "py", "fi...
2.3125
stackv2
# encoding:utf-8 import sqlite3 import os from flask import Flask, flash, request, redirect, url_for, render_template from werkzeug.utils import secure_filename UPLOAD_FOLDER = "./static/equipmentFiles/" ALLOWED_EXTENSIONS = {"txt", "pdf", "png", "jpg", "jpeg", "gif"} keyWords = { "All": 0, "关键词": 1, "购买自...
384
26.55
133
18
2,517
python
[{"finding_id": "codeql_py/flask-debug_1d21a08664512d7c_809c98d5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
20
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-601", "CWE-601", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/url-redirection", "py/url-redirection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection", ...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Untrusted URL redirection depends on a [user...
[ 384, 49, 54, 177, 195, 190, 191, 199, 207, 304, 123, 146, 148, 153, 314, 320, 328, 331, 333, 335 ]
[ null, null, null, null, null, null, null, 201, 209, null, null, null, null, null, 316, 322, null, null, null, null ]
[ 5, 12, 12, 29, 29, 31, 25, 17, 17, 27, 15, 19, 19, 19, 17, 17, 21, 27, 27, 27 ]
[ 40, 33, 55, 40, 40, 83, 77, 18, 18, 35, 69, 68, 75, 75, 18, 18, 84, 88, 88, 86 ]
2024-11-19T01:29:11.285130+00:00
1,599,757,080,000
31fc917f6a75e0930ebf5884367f3b40bf2e3aa4
3
{ "blob_id": "31fc917f6a75e0930ebf5884367f3b40bf2e3aa4", "branch_name": "refs/heads/master", "committer_date": 1599757080000, "content_id": "af2464d7b563c0af49e61948315403a44500424a", "detected_licenses": [ "MIT" ], "directory_id": "d94b4bff5ee0cd0c7d3a14825913e749e6d74603", "extension": "py", "fi...
3.40625
stackv2
#!/usr/bin/env python3.8 from user import User from credentials import Credentials def create_login(email,name,username,password): """ function to create a new account for password locker """ new_user=User(email,name,username,password) return new_user def save_login(user): """ Function to ...
224
37.08
160
25
1,406
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e4d30fc8b5a0b6c2_263e6121", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 158, 180 ]
[ 164, 186 ]
[ 37, 33 ]
[ 36, 36 ]
2024-11-19T01:29:33.845535+00:00
1,421,389,290,000
ff759bc6ed8d91578397904a77482af3ae959828
3
{ "blob_id": "ff759bc6ed8d91578397904a77482af3ae959828", "branch_name": "refs/heads/master", "committer_date": 1421389290000, "content_id": "56428838e32a27692c02c1c672d77b882f2de09c", "detected_licenses": [ "Unlicense" ], "directory_id": "41492de22a7b44f1f5c704bcd2c720812d8cad50", "extension": "py",...
2.9375
stackv2
__author__ = 'christianbuia' import random from Crypto.Cipher import AES import base64 import sys def pkcs7_padding(message_bytes, block_size): pad_length = block_size - (len(message_bytes) % block_size) if pad_length != block_size: for i in range(0, pad_length): message_bytes += bytes([p...
292
41.84
120
21
2,650
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_718d4611b1638f3d_4771045e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 30 ]
[ null ]
[ 12 ]
[ 54 ]
2024-11-19T01:29:47.528315+00:00
1,404,546,106,000
ee46d1341533ca7b2454a6f3c7eb867fa22607ac
3
{ "blob_id": "ee46d1341533ca7b2454a6f3c7eb867fa22607ac", "branch_name": "refs/heads/master", "committer_date": 1404546106000, "content_id": "7d22def85670a7d2422f1d652e31d00a349096a6", "detected_licenses": [ "MIT" ], "directory_id": "a486f43127b948161c6fe5eb3c1f8e1b3c5c9365", "extension": "py", "fi...
3
stackv2
# geopy works much better than pygeocoder (~50% failure rate) from geopy.geocoders import GoogleV3 import time # Read in data (hand-coded from Dimitri Veras' map) - http://dimitriveras.com/mapUSChrome/ with open('../data/us/us_astro_cities.csv','r') as f: cities = [l.strip() for l in f.readlines()] # Geocode add...
30
37.4
90
20
285
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b6e5f1311dac21ff_0435261a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 25 ]
[ null ]
[ 33 ]
[ 80 ]
2024-11-19T01:30:02.837307+00:00
1,522,357,315,000
752188648c752d85bc71a2b4c069cd0abf957e1d
3
{ "blob_id": "752188648c752d85bc71a2b4c069cd0abf957e1d", "branch_name": "refs/heads/master", "committer_date": 1522357315000, "content_id": "204c1184537aec0869c00235f9c834c83cfade8f", "detected_licenses": [ "MIT" ], "directory_id": "6552d440062cdc72d01ad3ef50b6421839afea5b", "extension": "py", "fi...
3.109375
stackv2
import sys import re import socket import ssl from multiprocessing.pool import ThreadPool as Pool import json __author__ = "David Debreceni Jr" class Extractor(): def __init__(self): self.pattern = r'(?:[a-zA-Z0-9](?:[a-zA-Z0-9\-]{,61}[a-zA-Z0-9])?\.)+[a-zA-Z]{2,6}' def domain_reader(self, file): ...
70
33.43
110
15
525
python
[{"finding_id": "codeql_py/insecure-default-protocol_5fafef440f187609_b444a86f", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 37 ]
[ null ]
[ 24 ]
[ 45 ]
2024-11-19T01:30:12.392087+00:00
1,592,259,150,000
b945d72445625ce28f708bce09f56065cf4c7c13
2
{ "blob_id": "b945d72445625ce28f708bce09f56065cf4c7c13", "branch_name": "refs/heads/master", "committer_date": 1592259150000, "content_id": "f3e7d4721ee858043a52e1937f24452010f987e6", "detected_licenses": [ "MIT" ], "directory_id": "aaec009eefb373bef6b7725848a34cb87c8b8f24", "extension": "py", "fi...
2.359375
stackv2
from flask import Flask, request, session, render_template, flash, redirect, url_for, send_file from werkzeug.security import generate_password_hash, check_password_hash from flask_sqlalchemy import SQLAlchemy from cryptosteganography import CryptoSteganography from double_auth import send_verfication from random impor...
107
30.93
95
17
708
python
[{"finding_id": "codeql_py/path-injection_ea9b31c6212e9db1_169e81e5", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 20 ]
[ 27 ]
2024-11-19T01:30:15.883293+00:00
1,690,851,575,000
04fe018cdb44add714b3f4139a25afa14876cf62
2
{ "blob_id": "04fe018cdb44add714b3f4139a25afa14876cf62", "branch_name": "refs/heads/master", "committer_date": 1690863000000, "content_id": "88fe53ad777d3ff7a48ce9f96401a00d1c783d61", "detected_licenses": [ "BSD-2-Clause", "BSD-3-Clause" ], "directory_id": "6ff084d17f22cf3abc4f2cc3d881f4b8218e1c51...
2.46875
stackv2
""" VK.com OpenAPI, OAuth2 and Iframe application OAuth2 backends, docs at: https://python-social-auth.readthedocs.io/en/latest/backends/vk.html """ import json from hashlib import md5 from time import time from ..exceptions import AuthException, AuthTokenRevoked from ..utils import parse_qs from .base import Base...
206
33.16
86
22
1,583
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b905a8a54a220ca3_ff9bb3cc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algori...
[ 63, 150, 199 ]
[ null, null, null ]
[ 20, 17, 27 ]
[ 56, 84, 73 ]
2024-11-19T01:30:26.325441+00:00
1,635,965,430,000
52c6e9c737b9401def87b426c048f13292c70d4f
3
{ "blob_id": "52c6e9c737b9401def87b426c048f13292c70d4f", "branch_name": "refs/heads/master", "committer_date": 1635965430000, "content_id": "3fb45fa7296437e95e1e7f51a63896ee1f807d80", "detected_licenses": [ "Apache-2.0" ], "directory_id": "79e1d04867c4298b23c907f92c7119e4bea8ef02", "extension": "py"...
2.6875
stackv2
#! /usr/bin/env python """ Helper script for modifying config.json files that are locked inside model.tar.gz archives. This is useful if you need to rename things or add or remove values, usually because of changes to the library. This script will untar the archive to a temp directory, launch an editor to modify the c...
62
30.73
94
12
428
python
[{"finding_id": "codeql_py/tarslip_354fac5957860a6a_1b9ee28f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 51 ]
[ null ]
[ 9 ]
[ 16 ]
2024-11-19T01:30:30.395869+00:00
1,636,898,449,000
4d9932bf6c592079e86cdedcc13401d2f641747d
3
{ "blob_id": "4d9932bf6c592079e86cdedcc13401d2f641747d", "branch_name": "refs/heads/main", "committer_date": 1636898449000, "content_id": "f9e6292e4cc91b5c1a75b23bacc350bceec076cf", "detected_licenses": [ "MIT" ], "directory_id": "72a3ee7f4ff24f8b8ef253942f69163dca428de4", "extension": "py", "file...
2.765625
stackv2
from datetime import datetime import os import docx2txt import pyttsx3 from flask import Flask, redirect, render_template, request from flask_sqlalchemy import SQLAlchemy from werkzeug.utils import secure_filename engine = pyttsx3.init() rate = engine.getProperty('rate') engine.setProperty('rate', 190) voices = e...
81
30.52
78
14
611
python
[{"finding_id": "codeql_py/flask-debug_72a5da2e0b28981f_524e0b10", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 81, 69 ]
[ null, null ]
[ null, 19 ]
[ 20, 75 ]
2024-11-19T01:30:39.192080+00:00
1,632,939,313,000
d5c5196611d5ca3e2cf7c05aff7b862515e58d48
3
{ "blob_id": "d5c5196611d5ca3e2cf7c05aff7b862515e58d48", "branch_name": "refs/heads/main", "committer_date": 1632939313000, "content_id": "39ea0ab948894f5bee9d31d3f8e9b96d0b6ddb27", "detected_licenses": [ "MIT" ], "directory_id": "127103b29a0c05988dbe7ce7a4b71da946dcf5a1", "extension": "py", "file...
3.296875
stackv2
import pandas as pd from bs4 import BeautifulSoup import re import nltk from nltk.tokenize.toktok import ToktokTokenizer import config tokenizer = ToktokTokenizer() stopword_list = nltk.corpus.stopwords.words("english") def remove_special_characters(text): """Remove unwanted characters [!@#$%^&*()] Args: ...
47
31.28
90
10
355
python
[{"finding_id": "codeql_py/overly-large-range_852b11bc6ebe5697_fc7c42a8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 21 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-19T01:54:54.434961+00:00
1,482,258,745,000
f3ffe49f22c16fc973ebc9c322a120e8f69363be
3
{ "blob_id": "f3ffe49f22c16fc973ebc9c322a120e8f69363be", "branch_name": "refs/heads/master", "committer_date": 1482258745000, "content_id": "7404b1a96f1504d7511def05256284c0a9869055", "detected_licenses": [ "MIT" ], "directory_id": "bd535bdaa6fc6800d30600e917907ff8e9fccadd", "extension": "py", "fi...
3.28125
stackv2
#!/usr/bin/python3 import sys import re # (.*[\[].*[\]])* == Any number of optional blocks, both inside and outside of square brackets # ([a-z])([a-z])\\2 == 'aba' pattern outside of square brackets # .* == any amount of characters later # \[[^\]]* == An opening square bracket followed by any number of characters wit...
35
40.77
115
13
421
python
[{"finding_id": "codeql_py/redos_d0a11daedf9c47d6_56a28659", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\[\\]'.", "reme...
4
true
[ "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\[\\]'.", "This part of the regular expression may cause exponential backtracking on strings starting with '\\[' and containing many repetitions of '\\]\\['.", "This part of the regular expression...
[ 12, 12, 22, 22 ]
[ null, null, null, null ]
[ 20, 26, 50, 56 ]
[ 22, 28, 52, 58 ]
2024-11-19T01:55:03.378591+00:00
1,552,071,651,000
b36687fa1d781c2199077802709207ed34d3696f
3
{ "blob_id": "b36687fa1d781c2199077802709207ed34d3696f", "branch_name": "refs/heads/master", "committer_date": 1552071651000, "content_id": "0315b57802823978d6172c146159adfcaac15c25", "detected_licenses": [ "MIT" ], "directory_id": "71dbb40bf28bddff0b96985fbd71c0837f37a572", "extension": "py", "fi...
2.546875
stackv2
import sys import logging import argparse from materials_commons.api import get_all_projects from ..utils.LoggingHelper import LoggingHelper from ..internal_etl.BuildProjectExperimentWithETL import BuildProjectExperiment def main(project, user_id, apikey, excel_file_path, data_dir_path): main_log = logging.getL...
95
39.25
116
16
806
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2f67f14e837f1f0a_5d4a5b5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 18 ]
[ null ]
[ 19 ]
[ 47 ]
2024-11-19T01:55:06.967866+00:00
1,551,005,779,000
88cd68d81f8daecf037803f1bfe3796b73e3e18f
3
{ "blob_id": "88cd68d81f8daecf037803f1bfe3796b73e3e18f", "branch_name": "refs/heads/master", "committer_date": 1551005779000, "content_id": "d80fc5bcef5ab1109fcb142d0c0c79000ae98b71", "detected_licenses": [ "MIT" ], "directory_id": "fd6ef19893df27aab0ac853039281bd1dfc517a7", "extension": "py", "fi...
2.796875
stackv2
import requests from bs4 import BeautifulSoup from argparse import ArgumentParser import os # # 実行例 # $ python crawler.py http://j-lyric.net/artist/a0018f8/l00c342.html . # # # # # if __name__ == "__main__": # 引数設定 usage = "$ python url"# usage = "$ python url path" argparser = ArgumentParser(us...
70
21.46
110
12
461
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c06e9fac857750d8_9ee163c2", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [j-lyric.net](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [j-lyric.net](1) may be at an arbitrary position in the sanitized URL." ]
[ 33 ]
[ null ]
[ 8 ]
[ 28 ]
2024-11-19T01:55:14.417219+00:00
1,522,354,819,000
d7e979150362fa590f0b84fe7905aaf5d1b6fc6f
3
{ "blob_id": "d7e979150362fa590f0b84fe7905aaf5d1b6fc6f", "branch_name": "refs/heads/master", "committer_date": 1522354819000, "content_id": "1057f2106cef5d0c6feccb26d41aad150bef927b", "detected_licenses": [ "MIT" ], "directory_id": "5a12697c3ca10ffd0c75200c5435c7b3f6bd2db5", "extension": "py", "fi...
3
stackv2
from google.cloud import texttospeech def list_voices(): """Lists the available voices.""" client = texttospeech.TextToSpeechClient() # Performs the list voices request voices = client.list_voices() for voice in voices.voices: # Display the voice's name. Example: tpc-vocoded print...
55
38.69
96
14
496
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c46f5edc62c67cd7_0e4e8fc0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 23 ]
[ 24 ]
[ 15 ]
[ 70 ]
2024-11-19T02:06:47.000856+00:00
1,530,706,342,000
91cbf15401bd9eeed0221840e11fa9182b47e2ae
3
{ "blob_id": "91cbf15401bd9eeed0221840e11fa9182b47e2ae", "branch_name": "refs/heads/master", "committer_date": 1530706342000, "content_id": "b4d4f6d90384499502093f62c3b61f49325ba2b9", "detected_licenses": [ "MIT" ], "directory_id": "1f2fcfe0945b93805344e10ef54d4ef6eed41a85", "extension": "py", "fi...
2.578125
stackv2
from Crypto.PublicKey import RSA from Crypto.Cipher import PKCS1_v1_5 import base64 def generate_key(request): rsa = RSA.generate(1024) private_pem = rsa.exportKey() request.session['key'] = str(private_pem, encoding="utf8") public_pem = rsa.publickey().exportKey() return str(public_pem, encoding=...
23
31.26
107
16
197
python
[{"finding_id": "codeql_py/weak-crypto-key_7047fa952427d1e1_42f7312d", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 7 ]
[ null ]
[ 11 ]
[ 29 ]
2024-11-19T02:07:12.727144+00:00
1,432,896,722,000
aae17cd1abe806b26e6e703593b6235030c407ef
3
{ "blob_id": "aae17cd1abe806b26e6e703593b6235030c407ef", "branch_name": "refs/heads/master", "committer_date": 1432896722000, "content_id": "2db11ff6cb7eece24afa7c6e13ca80babe1a59a2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c771b51f29da4d66d325042c6f1493c02aad3037", "extension": "py"...
2.890625
stackv2
# -*- coding: utf-8 -*- import scrapy.contrib.exporter from jinja2 import Environment, PackageLoader class JinjaRDFExporter(scrapy.contrib.exporter.BaseItemExporter): ''' Args: file(File) - a file ''' def __init__(self, file, **kwargs): self.file = file self.en...
69
33.48
92
20
523
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a6c46db85e58d8ce_32fb598b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 20 ]
[ 89 ]
2024-11-19T02:07:15.572005+00:00
1,529,957,901,000
1f2de3566ad1c465921e8fc34c8ecc6d28a7a035
2
{ "blob_id": "1f2de3566ad1c465921e8fc34c8ecc6d28a7a035", "branch_name": "refs/heads/master", "committer_date": 1529957901000, "content_id": "8847691d34be646072f8a7ff1f852489fc4a056b", "detected_licenses": [ "MIT" ], "directory_id": "35e999bf61bea6c6b0699cf5a35400b45632a1fd", "extension": "py", "fi...
2.40625
stackv2
from datetime import date from jinja2 import Environment, PackageLoader import pprint env = Environment(loader=PackageLoader('generator', 'templates')) def generate_class(obj): template = env.get_template('class.py') context = {"obj": obj} return template.render(context) def generate_group(group_name, ...
40
29.05
108
16
254
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b12a3e6a48a3a96f_d39683f1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 4 ]
[ null ]
[ 7 ]
[ 66 ]
2024-11-19T02:31:28.148334+00:00
1,534,843,829,000
e1053cf771b624d57f1c3d876b404e0a914f3cbf
2
{ "blob_id": "e1053cf771b624d57f1c3d876b404e0a914f3cbf", "branch_name": "refs/heads/master", "committer_date": 1534843829000, "content_id": "4845f3ceddc1b0503a28a2fe4b900bb43b889a09", "detected_licenses": [ "MIT" ], "directory_id": "a300412602307da4b3ce30d101d6cb7ce2b9c050", "extension": "py", "fi...
2.328125
stackv2
from flask import Blueprint, render_template, request, redirect, url_for, flash from flask_login import login_required, login_user, logout_user from utils import flash_errors blueprint = Blueprint('accounts', __name__, url_prefix='/accounts' ) from .forms import LoginForm @blueprint.route('/login', methods=['GE...
31
28.06
79
15
194
python
[{"finding_id": "codeql_py/url-redirection_0ed776a7ab3c8ee0_bead73cc", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 29 ]
[ 41 ]
2024-11-19T02:31:40.038020+00:00
1,598,767,792,000
3fb690e2831b87b3b5e77c7d801a4e45272c3912
3
{ "blob_id": "3fb690e2831b87b3b5e77c7d801a4e45272c3912", "branch_name": "refs/heads/master", "committer_date": 1598767792000, "content_id": "ca01b344957ef366388ee5c7e393951cf403b284", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b314891c44228cae856852dac5dafe4a0613af75", "extension": "py"...
2.625
stackv2
#!/usr/bin/env python from six.moves.BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer #from six.moves.socketserver import ThreadingMixIn #import threading import argparse import os import random import sys import socket import requests try: TimeoutError except NameError: TimeoutError = socket.timeout...
153
32.01
145
17
1,088
python
[{"finding_id": "codeql_py/request-without-cert-validation_217b26863a3af8c6_0648364d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 49, 71 ]
[ null, null ]
[ 20, 20 ]
[ 102, 119 ]
2024-11-19T02:31:42.477838+00:00
1,544,152,233,000
32c4c5bd038bae0b44a24aaa2849efd7a8d541b4
3
{ "blob_id": "32c4c5bd038bae0b44a24aaa2849efd7a8d541b4", "branch_name": "refs/heads/master", "committer_date": 1544152233000, "content_id": "e3a7601e7e0a805e82fd67fa1c7bda5309b423a2", "detected_licenses": [ "MIT" ], "directory_id": "a502db4cc1c8bb5c36b8982418c7a9f230f253a6", "extension": "py", "fi...
2.75
stackv2
import os.path import logging logger = logging.getLogger('pyledserver.User') logger.setLevel(logging.INFO) class CredentialsContainer(object): def __init__(self): if CredentialsContainer._is_first_setup(): with open('user_info.txt', 'w') as f: self.mqtt_url = input('MQTT u...
75
43.47
105
26
562
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c1222a8261a2b75a_ebb96e2c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 16 ]
[ 19 ]
[ 30 ]
[ 69 ]
2024-11-19T02:31:56.214702+00:00
1,553,103,927,000
3b35ffe81cc9e862c4baf9f9b558e73b695dccc1
2
{ "blob_id": "3b35ffe81cc9e862c4baf9f9b558e73b695dccc1", "branch_name": "refs/heads/master", "committer_date": 1553103927000, "content_id": "d55d8737903e5f0a7567ee3ac4d1ad12b74a2ada", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "72dd6cec09943a0ec21310eaad9e45094b1d772d", "extension": "p...
2.34375
stackv2
"""Contains serializers for models.""" from django.conf import settings from django.core.exceptions import ValidationError from django.utils import timezone from rest_framework import serializers from .models import Game, Player, User class UserReadOnlySerializer(serializers.ModelSerializer): """A serializer for...
77
26.79
70
14
418
python
[{"finding_id": "codeql_py/stack-trace-exposure_2361d5db1c333ee0_729a55c3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 75 ]
[ null ]
[ 47 ]
[ 53 ]
2024-11-19T02:32:10.113765+00:00
1,539,679,964,000
bf11628f5cd716754ff35315bdf4a0e192e71774
4
{ "blob_id": "bf11628f5cd716754ff35315bdf4a0e192e71774", "branch_name": "refs/heads/master", "committer_date": 1539679964000, "content_id": "6e186777e7cd9a1bfd312b15776605557bc059ef", "detected_licenses": [ "MIT" ], "directory_id": "06673ad0db1c1ba04243a6c4a9baf29faacbcaf3", "extension": "py", "fi...
4.4375
stackv2
import random print('----------------------------------------------') print(' SPACEMAN WORD GAME') print('----------------------------------------------') def load_words(): f = open('spaceman_words.txt', mode = 'r') word_list = f.readlines() f.close() word_list = word_list[0].split(' ') ...
100
38.2
141
15
929
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5ec8e4c70fbabed0_015ac15c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](...
[ 50, 94, 98 ]
[ null, null, null ]
[ 15, 19, 15 ]
[ 65, 88, 57 ]
2024-11-19T02:32:52.146787+00:00
1,613,587,228,000
e804990feb738d6197c5dad5ce167e40def0ca8c
3
{ "blob_id": "e804990feb738d6197c5dad5ce167e40def0ca8c", "branch_name": "refs/heads/main", "committer_date": 1613587228000, "content_id": "31aeb0a1a812aa979b8d896d97f6579ca0eb8ee5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ef3a0cd889e44a9b41036e4ee8df6c6896586593", "extension": "py", ...
3.0625
stackv2
import sys, requests class RevokeToken(): def __init__(self, token): self.token = token.removeprefix("oauth:") # Get client id based on user OAuth token oauthValidateUrl = 'https://id.twitch.tv/oauth2/validate' oauthValidateHeaders = {'Authorization': 'OAuth ' + self.token} ...
44
33.16
102
15
339
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_babfc5b8d2d981cb_34ae620c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 13, 29 ]
[ null, null ]
[ 19, 23 ]
[ 50, 41 ]
2024-11-19T02:33:00.662769+00:00
1,537,846,668,000
472830082ae1a2ff15306db784d8594a75b0df5f
2
{ "blob_id": "472830082ae1a2ff15306db784d8594a75b0df5f", "branch_name": "refs/heads/master", "committer_date": 1537846668000, "content_id": "bcaf7fac800128eacd09ec02dcf80fa2bfc9caac", "detected_licenses": [ "Apache-2.0" ], "directory_id": "aa361fc25ad361f653aa773aa771625c82ea9625", "extension": "py"...
2.40625
stackv2
# -*- coding: utf-8 -*- import scrapy import re from BaiduZhidao.items import BaiduzhidaoItem class BaiduSpider(scrapy.Spider): name = "baidu" # allowed_domains = ["zhidao.baidu.com"] urls = [] with open('/home/python/Desktop/实体4.csv') as f: content = f.read().strip() keys = content.s...
65
33.91
116
16
622
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_f985160f157d4061_31848ba5", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'baidu.com/question/', so it might m...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'baidu.com/question/', so it might match more hosts than expected." ]
[ 26 ]
[ null ]
[ 38 ]
[ 104 ]
2024-11-19T02:33:01.677366+00:00
1,686,599,963,000
917c71c3c25c5355b60d3264bdf8c87b61ba39e8
2
{ "blob_id": "917c71c3c25c5355b60d3264bdf8c87b61ba39e8", "branch_name": "refs/heads/master", "committer_date": 1686599963000, "content_id": "6c3d29136edc80382a78540257d82381c83644ac", "detected_licenses": [ "MIT" ], "directory_id": "77ff40ab8d90d15013f9cc884c2eb3ed24cd5cf7", "extension": "py", "fi...
2.40625
stackv2
"""Utilities for constructing a help card from a node.""" # ============================================================================= # IMPORTS # ============================================================================= # Standard Library import collections.abc import io import re from importlib import resour...
379
26.45
97
17
2,296
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e8af03d47d2e14e2_1712196e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 244 ]
[ null ]
[ 16 ]
[ 41 ]
2024-11-19T02:43:40.233715+00:00
1,540,781,958,000
35e98f19516221321bbacd9fa0ba1b97dfafc611
3
{ "blob_id": "35e98f19516221321bbacd9fa0ba1b97dfafc611", "branch_name": "refs/heads/master", "committer_date": 1540781958000, "content_id": "8310ddb3840ed1b177827c4b756253d38d13e9ed", "detected_licenses": [ "MIT" ], "directory_id": "815532da86fb0e59acdda1599344f2f8d1fbc705", "extension": "py", "fi...
3.109375
stackv2
# coding=utf-8 import os import sys MIN_PASSWORD_LENGTH = 8 MAX_PASSWORD_LENGTH = 64 ERROR_INVALID_INPUT = ('Please check that your input is in the correct format. \n' + 'python password_validator.py input_password.txt commonly_used_password_file.txt') ERROR_FILE_NOT_FOUND = 'File {} is not found.' ERROR_PASSWORD_IS...
127
29.69
117
17
888
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8ac2022feb932a44_d92689b8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 68, 75, 76, 77 ]
[ null, null, null, null ]
[ 12, 8, 8, 8 ]
[ 65, 60, 75, 55 ]
2024-11-19T02:43:40.401670+00:00
1,515,965,133,000
b9ab712c26e9cc730b8779127fbc0f2cdb245f21
2
{ "blob_id": "b9ab712c26e9cc730b8779127fbc0f2cdb245f21", "branch_name": "refs/heads/master", "committer_date": 1515965133000, "content_id": "41c583d984b0c90797f09e0a8eafd9663841765c", "detected_licenses": [ "MIT" ], "directory_id": "a73731d4d69ac519f62d837dde5e48804b176e3f", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/python3 from smbus2 import SMBus import requests import requests.adapters import pytz import time import os import json import datetime import logging as _logging import traceback LOG_FORMAT = '%(asctime)s [%(levelname)s] %(name)s:%(filename)s:%(lineno)d %(msg)s' logger = _logging.getLogger(__name__) cla...
342
32.69
116
21
3,566
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c12a3788efb544b9_db618ed9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 276 ]
[ null ]
[ 22 ]
[ 62 ]
2024-11-19T02:54:56.615758+00:00
1,413,891,914,000
bbf1b2791bd074e85c4e36531271e9040193feea
3
{ "blob_id": "bbf1b2791bd074e85c4e36531271e9040193feea", "branch_name": "refs/heads/master", "committer_date": 1413891914000, "content_id": "dee8c7e56e2141470125821680253b74e96a5e72", "detected_licenses": [ "CC0-1.0" ], "directory_id": "07f319874c86bc782c461a3cf1674ea4017fcee0", "extension": "py", ...
2.609375
stackv2
import base64, os, os.path from flask import make_response import utils from mailconfig import get_mail_user_privileges DEFAULT_KEY_PATH = '/var/lib/mailinabox/api.key' DEFAULT_AUTH_REALM = 'Mail-in-a-Box Management Server' class KeyAuthService: """Generate an API key for authenticating clients Clients must re...
109
29.41
97
17
849
python
[{"finding_id": "codeql_py/overly-permissive-file_e9ca00ee68fa7607_6baa73e9", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to group readable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to group readable." ]
[ 34 ]
[ null ]
[ 22 ]
[ 67 ]
2024-11-19T02:55:04.111916+00:00
1,613,278,901,000
1902fcbe8330363290bd88a6b812553d4f2f879e
3
{ "blob_id": "1902fcbe8330363290bd88a6b812553d4f2f879e", "branch_name": "refs/heads/main", "committer_date": 1613278901000, "content_id": "6d142137cbadcbaaf802d5cb5c72bbbb5d4729f5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "58e48af4a2d236dd3a0d96e6a2476748d0ebc927", "extension": "py", ...
2.78125
stackv2
from flask import Flask from flask import request app = Flask(__name__) @app.route("/terminal",methods=['POST','GET']) def hello(): try: from oled_terminal import oled_term from time import sleep myTerm=oled_term() myTerm.print_line("Hello %s"%(request.form["user"])) sleep(...
20
22.1
60
14
114
python
[{"finding_id": "codeql_py/stack-trace-exposure_823860c41eafc1ce_b2b1a3ae", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 15, 19 ]
[ null, null ]
[ 16, 5 ]
[ 22, 24 ]
2024-11-19T02:55:04.241640+00:00
1,374,530,643,000
80a499dc7eec2bd16351a24ec58b08d3ebe04b92
3
{ "blob_id": "80a499dc7eec2bd16351a24ec58b08d3ebe04b92", "branch_name": "refs/heads/master", "committer_date": 1374530643000, "content_id": "2fefd79d754674c05fc8d5b1d135d7e281db7005", "detected_licenses": [ "MIT" ], "directory_id": "034109cec06a91f05561169c8389708296ce7b9c", "extension": "py", "fi...
2.53125
stackv2
''' Created on 10 Jul 2013 @author: jamie@botsofbitcoins.com ''' #!/usr/bin/env python # -*- encoding: utf-8 -*- from suds.client import Client from suds import WebFault import datetime from hashlib import sha256 import logging logging.basicConfig(level=logging.DEBUG) class OkPayAPI(): def __init__(self, api_pa...
233
45.97
120
19
2,221
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1baf298668468978_d62b67da", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 32 ]
[ null ]
[ 38 ]
[ 50 ]
2024-11-19T02:55:19.371273+00:00
1,626,975,580,000
058848ea45735fd791c08cae78957f073815c587
3
{ "blob_id": "058848ea45735fd791c08cae78957f073815c587", "branch_name": "refs/heads/main", "committer_date": 1626975580000, "content_id": "7b65f2310affbd8bf21ccfb28d51f268457743db", "detected_licenses": [ "MIT" ], "directory_id": "5318ab73366b0135322286dab00d7e2f219f6a5b", "extension": "py", "file...
2.59375
stackv2
from flask import Flask, request, redirect, render_template from flask_sqlalchemy import SQLAlchemy from datetime import datetime from werkzeug.utils import redirect app = Flask(__name__) app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///blog.db' db = SQLAlchemy(app) class BlogPost(db.Model): id = db.Column(db...
56
26.55
81
13
351
python
[{"finding_id": "codeql_py/flask-debug_2df51b74c04694bb_9f078b1b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 56, 47 ]
[ null, null ]
[ 5, 12 ]
[ 24, 27 ]
2024-11-19T02:55:22.782503+00:00
1,589,085,044,000
ce4f9b1e832a783099727c885fd8bc140138be06
3
{ "blob_id": "ce4f9b1e832a783099727c885fd8bc140138be06", "branch_name": "refs/heads/master", "committer_date": 1589085044000, "content_id": "55c24ce01f09a30b5e904db22ef6b40a48476f5a", "detected_licenses": [ "MIT" ], "directory_id": "c2b3abe111dea4e67a0a08901d222a5c3601d409", "extension": "py", "fi...
2.765625
stackv2
#!/usr/local/bin/python3 # coding: utf-8 from bottle import route, run, get, post, request, template, redirect import redis import random, string from hashlib import blake2b import re from time import sleep ############################## # 設定値 ############################## # Redis接続先 r = redis.Redis(host='localhost'...
148
25.39
148
14
1,334
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_4e848aaa935f1d1d_b9c3b9e0", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
2
true
[ "CWE-020", "CWE-327" ]
[ "py/incomplete-hostname-regexp", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'microsoft.com/', so it might match more hosts than expected.", "[Sensitive data (password)](1) is used in a hashing algorithm (BLAKE2B) that is insecure for password hashing, since it is not a computationally expensive has...
[ 42, 137 ]
[ null, null ]
[ 22, 16 ]
[ 72, 34 ]
2024-11-19T02:55:23.770444+00:00
1,609,331,271,000
176b6c625785f01af8441e963c44d62a19931217
3
{ "blob_id": "176b6c625785f01af8441e963c44d62a19931217", "branch_name": "refs/heads/main", "committer_date": 1609331271000, "content_id": "1d46c0a63991fd10e896dcbc02a72016fe9e70fa", "detected_licenses": [ "MIT" ], "directory_id": "787d9b3ca96ab583c69eb76fa5a4bdb3688b8944", "extension": "py", "file...
2.578125
stackv2
# -*- coding: utf-8 -*- """ bracket ~~~~~ Bracket is an Elegant static site generator. :copyright: (c) 2020 by Ceorleorn(https://github.com/ceorleorn). :license: MIT License, see LICENSE for more details. """ from jinja2 import Template simpleTemplate = """<!DOCTYPE html> <html lang="{{ objdict[...
33
24.15
89
11
229
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9a9011fca1700c0d_f9c787f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32 ]
[ null ]
[ 16 ]
[ 40 ]
2024-11-19T02:55:49.419976+00:00
1,601,888,805,000
9224a02417dd3142c9b30ef25952aaeafa946c16
2
{ "blob_id": "9224a02417dd3142c9b30ef25952aaeafa946c16", "branch_name": "refs/heads/master", "committer_date": 1601888805000, "content_id": "f2bf3949ad8db1c286e128ce4698ed09f404be18", "detected_licenses": [ "MIT" ], "directory_id": "4999eea2624652cf5e02deb3aca52fc75a324c82", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python3 from typing import Dict, NoReturn, List import json import telegram from datetime import datetime from flask import Flask, request, jsonify from config import config # эта часть нужна для подключения прокси #from telegram.utils.request import Request #ProxyRequest = Request(proxy_url=config.RE...
94
29.84
137
11
763
python
[{"finding_id": "codeql_py/log-injection_af2c965928f46f57_8a1386eb", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 80, 88 ]
[ null, null ]
[ 17, 17 ]
[ 52, 52 ]
2024-11-19T02:56:00.003369+00:00
1,560,948,920,000
e75449a22b66389abed489b9becff4f9f0377660
3
{ "blob_id": "e75449a22b66389abed489b9becff4f9f0377660", "branch_name": "refs/heads/master", "committer_date": 1560948920000, "content_id": "ec86df991bf606d3b92a29adc039139b218ea6f3", "detected_licenses": [ "MIT" ], "directory_id": "e55a61292bbd4ab42865279712a5a0c02ded0406", "extension": "py", "fi...
3.078125
stackv2
'''Emarsys API Authenticator This script allows the user to easily create a X_WSSE header for Authentication with the Emarsys RESTful API. ''' # import needed modules import uuid import hashlib import datetime import base64 def create_xwsse_header(username, secret): # Returns x_wsse authentication headers for e...
73
31.68
142
15
595
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0bcdfb8bdc8cac91_50452430", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 58 ]
[ null ]
[ 24 ]
[ 51 ]
2024-11-19T03:10:19.262138+00:00
1,489,539,420,000
ca1f3afcbe0fe3dc34e5672e812ee53a563404c7
3
{ "blob_id": "ca1f3afcbe0fe3dc34e5672e812ee53a563404c7", "branch_name": "refs/heads/master", "committer_date": 1489539420000, "content_id": "137db078bf7a3ba79390a8125a8d5fb92e1582a7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "34a336427df056ce3c21c5a2cf2f9c8e416c75eb", "extension": "py"...
2.96875
stackv2
""" A python flask application to scroll through a kanji database """ import os # pylint: disable=import-error from flask import Flask, request, render_template import psycopg2 APP = Flask(__name__) @APP.route('/') def index(): """ Main page, displays all kanji groups. """ return render_template('main.htm...
117
30.39
97
19
885
python
[{"finding_id": "codeql_py/flask-debug_638cebe8aea5080e_007f0e65", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-089", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).\nThis SQL query depends on a [user-provided value](3).", "This SQL query depends on...
[ 117, 33, 95 ]
[ null, null, null ]
[ 5, 6, 17 ]
[ 51, 93, 22 ]
2024-11-19T03:10:50.622161+00:00
1,490,078,106,000
19556c95e23a198eae66854ca78c3aa0becc3434
3
{ "blob_id": "19556c95e23a198eae66854ca78c3aa0becc3434", "branch_name": "refs/heads/master", "committer_date": 1490078106000, "content_id": "5227a7336b9040237d182ca966e80d482abedcf3", "detected_licenses": [ "MIT" ], "directory_id": "8699854f12aa396ed3c21cd577b93176566bd7ab", "extension": "py", "fi...
2.8125
stackv2
''' The business logic & routing controller of this module The is the controller aspect of the module. References: - The Parent Application - The Parent Application database - The Parent Application utilities - This module's: database models, jinja templates, and WTForms Yields: - Method: Load Us...
131
32.94
89
16
774
python
[{"finding_id": "codeql_py/url-redirection_62220864534ef847_0f09e69d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 86 ]
[ null ]
[ 29 ]
[ 58 ]
2024-11-19T03:21:44.896672+00:00
1,450,402,050,000
d052f5cd0a420902da567460f94fd24b6e1742c2
4
{ "blob_id": "d052f5cd0a420902da567460f94fd24b6e1742c2", "branch_name": "refs/heads/master", "committer_date": 1450402050000, "content_id": "006a54cd165f95c71e645a9f6c5eca12b3c609c6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ff1f44bd9726b535bf3c1fb7f93c406dfd9d8ab9", "extension": "py"...
3.75
stackv2
class Student(object): count = 0 books = [] def __init__(self, name, age): self.name = name self.age = age @classmethod def printClassInfo(cls): print(cls.__name__) print(dir(cls)) @staticmethod def printClassAttr(): print(Student.count) p...
50
18.34
50
12
246
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dcc774d1fa95c74d_8f399c07", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 38 ]
[ null ]
[ 37 ]
[ 50 ]
2024-11-19T03:22:20.548614+00:00
1,579,694,394,000
9ff928c8ba4de609100a33c1acee27e5c6a52947
2
{ "blob_id": "9ff928c8ba4de609100a33c1acee27e5c6a52947", "branch_name": "refs/heads/master", "committer_date": 1579694394000, "content_id": "64b8131e20a4ee74907ddc9b3e00df02bea02346", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8b0e1edebd5b1808e7781d3298829c85ce8f5f01", "extension": "p...
2.40625
stackv2
#coding: utf-8 import os import time import sqlite3 from flask import Flask, request import ambient from .bme280 import BME280 app = Flask(__name__) @app.route('/view', methods=["GET"]) def view(): return "ok" @app.route('/bme280', methods=["POST"]) def bme280(): post_data = request.get_data().splitlines()...
106
24.7
94
14
856
python
[{"finding_id": "codeql_py/log-injection_244218289c2b9da1_56c26349", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 28 ]
[ null ]
[ 21 ]
[ 94 ]
2024-11-19T03:22:21.953570+00:00
1,690,207,793,000
c87cb2da0e03ca50e63f75f7f7f51cb42d265341
3
{ "blob_id": "c87cb2da0e03ca50e63f75f7f7f51cb42d265341", "branch_name": "refs/heads/master", "committer_date": 1690207793000, "content_id": "324c5a723e50caae3de799f2bab6c3fc3245c233", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8d9e2a5319e96043b04203e2af8afecce20bc8e3", "extension": "py"...
2.890625
stackv2
#!/usr/bin/python3 # # Read 0.1° occurrence density counts from a CSV, which is assumed to be ordered by snapshot. # # For each new snapshot, create a matrix of 3600×1800 pixels. # # Colour the pixels in the matrix according to density. # # Write the coloured pixels over the appropriate basemap and output as a PNG. # ...
98
33.98
136
19
1,158
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5374aa066af44fda_c9923dd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 95, 95 ]
[ null, null ]
[ 57, 75 ]
[ 73, 90 ]
2024-11-19T03:44:01.750155+00:00
1,479,784,252,000
f60017de3ddac8190f299539a9f52bbd62bca651
2
{ "blob_id": "f60017de3ddac8190f299539a9f52bbd62bca651", "branch_name": "refs/heads/master", "committer_date": 1479784252000, "content_id": "05cdd86ba27c6b6fd8624ed2f91518af43ed01db", "detected_licenses": [ "MIT" ], "directory_id": "c84033ea44849e85af96e6d02d7edbbb4602f3e1", "extension": "py", "fi...
2.453125
stackv2
import io import json import requests from os import curdir, sep from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler from cgi import parse_header, parse_multipart, FieldStorage from PIL import Image STACK_URL = 'http://127.0.0.1:8000' class RequestHandler(BaseHTTPRequestHandler): def crop(self, x, ...
122
26.49
124
16
759
python
[{"finding_id": "codeql_py/path-injection_4e068ce148c8c490_fd4a99b2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-918" ]
[ "py/path-injection", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 84, 54 ]
[ null, null ]
[ 26, 21 ]
[ 50, 38 ]
2024-11-19T03:44:26.307978+00:00
1,609,312,243,000
a6fe36d54d9d0b338cd50fe8c348cac5081c333d
2
{ "blob_id": "a6fe36d54d9d0b338cd50fe8c348cac5081c333d", "branch_name": "refs/heads/main", "committer_date": 1609312243000, "content_id": "4ba1a787a25a4908e20297331a06f371edad6243", "detected_licenses": [ "MIT" ], "directory_id": "abbc3e56996d8e9396397eb78f02745785e2ad03", "extension": "py", "file...
2.359375
stackv2
from flask import Flask,render_template,request import requests import json web = Flask(__name__) @web.route('/') def explore(): node = "https://mainnet.cn.utools.club" res = requests.get(str(node) + '/blocks') text = res.text txt = json.loads(text) return render_template("page.html",txt = txt,nod...
23
24.87
59
12
158
python
[{"finding_id": "codeql_py/full-ssrf_589ac6ec7e268b04_dbd22778", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 18 ]
[ null ]
[ 11 ]
[ 46 ]
2024-11-19T01:44:09.461692+00:00
1,457,525,295,000
f0766cda9bd415efe147fe7c650c2a0fa8539f8f
2
{ "blob_id": "f0766cda9bd415efe147fe7c650c2a0fa8539f8f", "branch_name": "refs/heads/master", "committer_date": 1457525295000, "content_id": "4a2bef876764f10e403724a226ab48cca0b002af", "detected_licenses": [ "MIT" ], "directory_id": "5f66eae1a5247e9f495728c0f6dcd875313f1024", "extension": "py", "fi...
2.390625
stackv2
# -*- coding: utf-8 -*- """ Created on Tue Jun 9 17:14:46 2015 @author: noore """ from SOAPpy import SOAPProxy import hashlib class BrendaSoap(object): def __init__(self, username, password): self.client = self._GetClient() self.My_Username = username password = hashlib.sha256(passwo...
90
33.92
82
19
719
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_35dea0ecda16bfb2_e8cc067e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 15 ]
[ null ]
[ 35 ]
[ 43 ]
2024-11-19T02:08:15.016831+00:00
1,655,988,043,000
f8765f78a8078ed467d2e82bc1b2b3a289bd4b27
3
{ "blob_id": "f8765f78a8078ed467d2e82bc1b2b3a289bd4b27", "branch_name": "refs/heads/master", "committer_date": 1655988043000, "content_id": "da4a31c8575567b959abe62658175b43bea6938e", "detected_licenses": [ "MIT", "BSD-3-Clause" ], "directory_id": "2f722aa3f8686bdd28e61a0e774d4db01c1671a9", "ext...
2.53125
stackv2
import csv import json import requests class Office365: """Password spray Microsoft Office 365""" def __init__(self, host, port, timeout, fireprox): self.timeout = timeout self.url = "https://login.microsoft.com/common/oauth2/token" if fireprox: self.url = f"https://{fi...
161
29.65
104
16
1,136
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fc4679bdf48784c5_82e34b50", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 159, 145 ]
[ null, 153 ]
[ 13, 13 ]
[ 100, 14 ]
2024-11-19T02:08:38.874294+00:00
1,590,154,487,000
f7efb4f03706aba34f8576501f11a3c5feed32ea
3
{ "blob_id": "f7efb4f03706aba34f8576501f11a3c5feed32ea", "branch_name": "refs/heads/master", "committer_date": 1590154487000, "content_id": "326cd2022122870ea2e1571569351effac1b98ff", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "531227359f98c9ed252e309928cf428e6afa37fc", "extension": "p...
2.609375
stackv2
import requests import xml.etree.ElementTree as ET import json user="duncannkhata" api_key = "c01bb036e0074f26ab3a6bb56f4b31ea" client_ip = "165.56.181.198" base_url = "https://api.sandbox.namecheap.com/xml.response?ApiUser=" + user + "&ApiKey=" + api_key + "&UserName=" + user + "&ClientIp="+ client_ip def get_hosts...
70
35.17
146
13
733
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_030a4e7a4f6e2f16_afae5aea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 70 ]
[ null ]
[ 7 ]
[ 35 ]
2024-11-19T02:21:35.968215+00:00
1,398,965,950,000
03ab9873b7f25cab2927ce2bf43d2b5a1f6049a0
3
{ "blob_id": "03ab9873b7f25cab2927ce2bf43d2b5a1f6049a0", "branch_name": "refs/heads/master", "committer_date": 1398965950000, "content_id": "4860753ac52b82407ab4a11ac3dcaf49cc2d6967", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "b9a11b1cda6aa511421b6f55f5449c505d1876cc", "extension": "p...
2.59375
stackv2
#!/usr/bin/env python # # This tool is distributed under a BSD licence. A copy of this # should have been included with this file. # # Copyright (c) 2007, Martyn Ruks # # This tool is designed for the purpose of performing security # testing only and is not intended to be used for unlawful # activities # # This tool...
244
27.32
170
18
1,661
python
[{"finding_id": "codeql_py/insecure-protocol_5b5cf908a9097274_18c84564", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to SSL.Context](1).", "remediation": "", "locat...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-protocol", "py/insecure-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Insecure SSL/TLS protocol version SSLv3 specified by [call to SSL.Context](1).", "Insecure SSL/TLS protocol version TLSv1 specified by [call to SSL.Context](1)." ]
[ 195, 198 ]
[ null, null ]
[ 19, 19 ]
[ 48, 48 ]
2024-11-19T03:10:05.399724+00:00
1,493,485,977,000
d51602f19de9a32ab8e0acd6eece53c7ee2c0dc2
3
{ "blob_id": "d51602f19de9a32ab8e0acd6eece53c7ee2c0dc2", "branch_name": "refs/heads/master", "committer_date": 1493485977000, "content_id": "cfe54aac2e0c9521859a14a0d24b15f088f9ef99", "detected_licenses": [ "MIT" ], "directory_id": "30f8b21d7dde062698702149f5f5e84019916563", "extension": "py", "fi...
2.6875
stackv2
"""This file contains the CRUD for users""" from flask import Blueprint, render_template, g, flash, redirect, url_for, request from app.validation import validate from app.models import User blueprint = Blueprint('users', __name__) @blueprint.before_request def adminCheck(): if not g.User.isAdmin: flash(...
71
34.46
104
15
561
python
[{"finding_id": "codeql_py/url-redirection_d82a8ec76f9b74bf_e9774ed1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 58, 70 ]
[ null, null ]
[ 25, 25 ]
[ 41, 41 ]
2024-11-19T03:10:11.776436+00:00
1,482,245,956,000
c22c7f82900a9ade27b5c7b880ba8414cfc9e946
3
{ "blob_id": "c22c7f82900a9ade27b5c7b880ba8414cfc9e946", "branch_name": "refs/heads/master", "committer_date": 1482245956000, "content_id": "4571411b7dfe463eab94f83b326c3d424a01a01b", "detected_licenses": [ "MIT" ], "directory_id": "f6352738bb8bef7713788b93b55f85aa36ced446", "extension": "py", "fi...
3.234375
stackv2
"""Basic web handler Provides a basic web handler framework for Google App Engine. Framework includes the ability to register, login, and logout users. """ import hashlib import hmac import random import re from string import letters import webapp2 from google.appengine.ext import db import settings as s def make...
231
29.55
74
14
1,577
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5b5c09e3e2be26bf_7d354b7e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 110 ]
[ null ]
[ 24 ]
[ 40 ]
2024-11-19T03:10:13.627513+00:00
1,631,008,346,000
b209a9f67ecf592cd8e7249f098f45f399adc7b7
2
{ "blob_id": "b209a9f67ecf592cd8e7249f098f45f399adc7b7", "branch_name": "refs/heads/master", "committer_date": 1631008346000, "content_id": "48ca3085c0852d2cc6c63609680418fb2d437c3a", "detected_licenses": [ "MIT" ], "directory_id": "74f1b75ef38c38b5820debf017781997d296863d", "extension": "py", "fi...
2.421875
stackv2
import os import datetime patient_title = "Mã bệnh nhân:%" location_title = "Địa điểm:%" subject_title = "Độ nguy hiểm:%" storage_file = open("db_add_info.txt", "a") identity = 0 if os.path.exists('./last_identity.txt'): with open('last_identity.txt', 'r') as f: identity = int(f.read()[0]) with open('e...
43
29.42
160
27
315
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8218429ca495cfdb_2cbf06a4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 35 ]
[ null ]
[ 32 ]
[ 41 ]
2024-11-19T03:22:37.810362+00:00
1,534,607,743,000
d28884c021478e2021a234550476cfae6c6421a9
3
{ "blob_id": "d28884c021478e2021a234550476cfae6c6421a9", "branch_name": "refs/heads/master", "committer_date": 1534607743000, "content_id": "f6873479a850895c23bc74cd0a7013fb78d8f81e", "detected_licenses": [ "MIT" ], "directory_id": "ae542ca54d07b671def857ca3d669d2766ba1bb6", "extension": "py", "fi...
2.65625
stackv2
# coding: utf-8 import sys from argparse import ArgumentParser from .entrystore import EntryStore, PwwError from .inputs import CLIInput class Command: def __init__(self, title, homedir, _input): self.title = title self.home = homedir self._input = _input def execute(self, cmd): ...
81
29.74
76
15
537
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d306b86f1f64857c_6c2da00f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 39 ]
[ null ]
[ 33 ]
[ 51 ]