added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T19:49:10.060789+00:00
1,507,821,688,000
dfc0c07643d2349182975ccc9d5e1db3b4914e97
3
{ "blob_id": "dfc0c07643d2349182975ccc9d5e1db3b4914e97", "branch_name": "refs/heads/master", "committer_date": 1507821688000, "content_id": "dcfd25f5a282a11779a00f4a226e13402ba047a0", "detected_licenses": [ "MIT" ], "directory_id": "04f6691ec49be9abd1dffe60aefdb2e39aadab2f", "extension": "py", "fi...
2.859375
stackv2
""" Defining the MNSIT dataset""" from __future__ import absolute_import import _pickle as cPickle import os import sys import tarfile import urllib.request import numpy as np import tensorflow as tf from ttools.core.datasets import Dataset from ttools.utils.utils import image_to_tfexample class Cifar10(Dataset): ...
142
37.99
110
20
1,207
python
[{"finding_id": "codeql_py/tarslip_7aa7df7742be6fb3_4e92ead1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 43 ]
[ null ]
[ 13 ]
[ 43 ]
2024-11-18T19:49:13.642051+00:00
1,596,457,425,000
b35c0247a8772eb4c0872120aa7de47e51e06e3f
3
{ "blob_id": "b35c0247a8772eb4c0872120aa7de47e51e06e3f", "branch_name": "refs/heads/master", "committer_date": 1596457425000, "content_id": "cad2a614b800db00742f4fdfd9bcb7cf55896b22", "detected_licenses": [ "MIT" ], "directory_id": "d5a316406ae2494ea82d7f012b96a956eb6f7131", "extension": "py", "fi...
3.09375
stackv2
''' @author: Reem Alatrash @version: 1.0 ======================= This module has helper functions that are meant to be used by several scripts ''' ''' ******* ********* ********* ******* imports ********* ******* ********* ********* ''' import os import codecs ''' ******* ********* ********* ******* functions **...
122
28.96
126
15
790
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_48d0760270e48bb2_218fc0aa", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 57 ]
[ null ]
[ 31 ]
[ 45 ]
2024-11-18T20:10:52.914921+00:00
1,531,579,049,000
8f658145bfdc6381c7f768995a2e13dd23b1c6d6
3
{ "blob_id": "8f658145bfdc6381c7f768995a2e13dd23b1c6d6", "branch_name": "refs/heads/master", "committer_date": 1531579049000, "content_id": "08f548377ce5efc63b63afb9f3461acddc1a5387", "detected_licenses": [ "Unlicense" ], "directory_id": "f65b5f0af5270dfcd4775fafa0ebf55bf6bb11e4", "extension": "py",...
2.828125
stackv2
#!/usr/bin/python import argparse import os import pathlib import shlex import subprocess import typing PREFIX = b'QR-Code:WIFI:' class Wifi(typing.NamedTuple): ssid: str security: str password: str = '' hidden: bool = False def main(): config = parse_args() if not config.interface: ...
148
30.86
113
19
1,033
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_dde09d23061e85cc_80be6ed0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 115, 118 ]
[ null, null ]
[ 21, 15 ]
[ 28, 51 ]
2024-11-18T20:11:09.213762+00:00
1,568,452,095,000
f0030c965eede9dc8cdd5156b69d3c7ff1fd4955
2
{ "blob_id": "f0030c965eede9dc8cdd5156b69d3c7ff1fd4955", "branch_name": "refs/heads/master", "committer_date": 1568452095000, "content_id": "90d6537427abfc2033cd5fe43ed41f76da3958ba", "detected_licenses": [ "ISC" ], "directory_id": "3d39a53d1d909e3455197376e1e195014a8d4b27", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python import boto3 import argparse import logging logging.basicConfig(level=logging.INFO) logger = logging.getLogger(__name__) parser = argparse.ArgumentParser() required_named = parser.add_argument_group('required named arguments') required_named.add_argument('--stack-name', help='name of stack to b...
50
38.96
111
17
436
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a0fdca4e15263cbd_f72a4828", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 35 ]
[ null ]
[ 29 ]
[ 87 ]
2024-11-18T20:26:04.449615+00:00
1,464,055,740,000
814f079fb5ad17bfcaacdfb2fbc78233a643d992
3
{ "blob_id": "814f079fb5ad17bfcaacdfb2fbc78233a643d992", "branch_name": "refs/heads/master", "committer_date": 1464055740000, "content_id": "034f570f7778ad8b0de2da6eff58f1ece9419a7f", "detected_licenses": [ "MIT" ], "directory_id": "9093a621f65cb56931f5fb6cde22ef08dac62f83", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/python from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer from os import curdir, sep import os import cgi import json PORT = 8080 class Handler(BaseHTTPRequestHandler): def formatPath(self, p): if p.startswith('/dist') or p.startswith('/lib'): return '../..' + p; ...
106
30.82
100
21
671
python
[{"finding_id": "codeql_py/path-injection_287d8eda29fa495f_806b71e1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 48, 50, 75 ]
[ null, null, null ]
[ 39, 26, 27 ]
[ 47, 34, 78 ]
2024-11-18T20:26:27.850591+00:00
1,619,084,788,000
cef14f092582e0bfa65a4fd58f9d29ec5fca5a99
3
{ "blob_id": "cef14f092582e0bfa65a4fd58f9d29ec5fca5a99", "branch_name": "refs/heads/main", "committer_date": 1619084788000, "content_id": "44a8c16012d3d2f6cca7782b126d7e13496b90a1", "detected_licenses": [ "MIT" ], "directory_id": "b62919609acdb9dad3f09e862f59e55319c44ee2", "extension": "py", "file...
2.734375
stackv2
import dbconnector.dbconnector as dbcon from openpyxl import load_workbook import sys import re class ExcelLoader(): user_list = [] drone_list = [] excluded_headder=["Map","Track","Race","Level",None] user_id = {} drone_id = {} def __init__(self, db): self.db = db for user in db.get_users(): self.user...
139
23.63
107
25
998
python
[{"finding_id": "codeql_py/overly-large-range_e5ec6abac6ca5c9f_5d267d2b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 106, 116 ]
[ null, null ]
[ 28, 28 ]
[ 31, 31 ]
2024-11-18T20:26:39.422714+00:00
1,605,559,776,000
86538f151f70fb2f0889b35030141afd9ffddb21
3
{ "blob_id": "86538f151f70fb2f0889b35030141afd9ffddb21", "branch_name": "refs/heads/main", "committer_date": 1605559776000, "content_id": "a2442a7e3b3ea959a13a3af660aa45f9c01af917", "detected_licenses": [ "MIT" ], "directory_id": "d0cfb49e6c2b8a30a905ccd86eed7da1fe164a9f", "extension": "py", "file...
3.234375
stackv2
import requests import validators import pprint import re from logzero import logger from urllib.parse import urljoin from bs4 import BeautifulSoup pp = pprint.PrettyPrinter(indent=4) root_url = 'https://www.nyrr.org' # This should be the hostname / root URL as we will be appending to it later. rule = re.compile(r"^[\...
83
36.3
123
14
744
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_b77ca875fbb8ff69_441a4ce1", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'nyrr.org', so it might match more hosts than expected." ]
[ 10 ]
[ null ]
[ 13 ]
[ 33 ]
2024-11-18T20:26:43.613369+00:00
1,536,559,756,000
d0d9c019b05118c9b3cb8d22570f00fd98321103
2
{ "blob_id": "d0d9c019b05118c9b3cb8d22570f00fd98321103", "branch_name": "refs/heads/master", "committer_date": 1536559756000, "content_id": "d11eaef77ab2cce9386f7e90374b80fed705717c", "detected_licenses": [ "MIT" ], "directory_id": "ca8dc4d5b6168648cf8a842fc27191fec3597a09", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf-8 -*- import sys import time import hashlib import requests import json from queue import Queue, Empty from multiprocessing.dummy import Pool from threading import Thread # 此处为APIID SECRET apiid = ' ' secret = ' ' # 此处为API请求地址及参数 REST_HOST = "http://api.coinbene.com" market_url = "http://api.coinb...
255
26.57
101
16
1,728
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_25b9ccedc1c446b5_21e5bd75", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 139 ]
[ null ]
[ 18 ]
[ 26 ]
2024-11-18T20:27:06.034871+00:00
1,630,512,906,000
18f5d56a4152941c64e7952e5355aeb41b42de1f
3
{ "blob_id": "18f5d56a4152941c64e7952e5355aeb41b42de1f", "branch_name": "refs/heads/master", "committer_date": 1630512906000, "content_id": "70ed75dbb4ea1cc582802491bdb5c48954768835", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "39de0918eec8cea8568a8e7caaf261c9b4b30be4", "extension": "p...
2.9375
stackv2
""" This example demonstrates showing some basic details about your lists Below you can see examples of pagination as well as partial response """ import requests import json try: import urlparse except ImportError: from urllib import parse as urlparse from config import MailChimpConfig config = MailChimpCon...
54
26.7
73
13
342
python
[{"finding_id": "codeql_py/request-without-cert-validation_a691619eff5063d4_e9ada486", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 27 ]
[ 28 ]
[ 16 ]
[ 57 ]
2024-11-18T20:52:05.974475+00:00
1,406,546,062,000
d74cf405005ab2f92612d6354ae7a334097717d4
3
{ "blob_id": "d74cf405005ab2f92612d6354ae7a334097717d4", "branch_name": "refs/heads/master", "committer_date": 1406546062000, "content_id": "08a854a67ebf382f290e724e34f45ff1859c4304", "detected_licenses": [ "Apache-2.0" ], "directory_id": "20d20c1da3ec86389fc06d83990b88d99245e184", "extension": "py"...
2.625
stackv2
import tornado.ioloop import tornado.web import tornado.httpserver from tornado.options import define, options from PIL import Image import os from conf import * define('port', default=9999, help="run on port 9999", type=int) def get_blank(): """ return blank image in case: 1. image doesn't exist 2. ...
256
29.53
96
17
1,796
python
[{"finding_id": "codeql_py/path-injection_e0c0c61f0f2d7ae5_b12de8b0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
6
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](...
[ 49, 51, 62, 63, 182, 222 ]
[ null, null, null, null, null, null ]
[ 29, 31, 30, 30, 62, 22 ]
[ 33, 52, 34, 52, 66, 26 ]
2024-11-18T20:52:27.049498+00:00
1,626,706,364,000
f3bf04d253dfd30e133fba78845ea747fa2be6ea
4
{ "blob_id": "f3bf04d253dfd30e133fba78845ea747fa2be6ea", "branch_name": "refs/heads/main", "committer_date": 1626706364000, "content_id": "7584f243798b7295c2515f549c256165e715ef54", "detected_licenses": [ "MIT" ], "directory_id": "ac842c87aa6958f70f00c55b03e8cd8f5d9c0f50", "extension": "py", "file...
3.71875
stackv2
#Classe de cores class bcolors: OK = '\033[92m' #GREEN WARNING = '\033[93m' #YELLOW FAIL = '\033[91m' #RED RESET = '\033[0m' #RESET COLOR AZUL = '\033[1;34m ' user = "andre" password = "1234" CPF = ["xxx.xxx.xxx-xx"] #Inicio do Programa en = ("N") while en == ("N") and en!=("S"): print(f'''{bcolo...
80
27.74
67
15
677
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_697eeb0d0b032dab_eefba160", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 56 ]
[ 65 ]
[ 14 ]
[ 37 ]
2024-11-18T20:52:27.174590+00:00
1,583,134,455,000
61a243f35c0c8e3b3430eca0ddb99d53a8003fb8
2
{ "blob_id": "61a243f35c0c8e3b3430eca0ddb99d53a8003fb8", "branch_name": "refs/heads/master", "committer_date": 1583134455000, "content_id": "def9cf0eb838135d3fbfee6ccc862d818f2ae528", "detected_licenses": [ "Unlicense" ], "directory_id": "74272324b51a7faa628db7a25c89b8907478d8b7", "extension": "py",...
2.46875
stackv2
from kivy.logger import Logger import os import paramiko import vyattaconfparser import json class Router(object): def __init__(self, config, resp_q): self.commands = { 'connect': self.connect, 'disconnect': self.disconnect, 'drop_kids_packets': self.drop_kids_packets, ...
217
41.12
101
21
1,889
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_82e4a92dc20da7ee_983c1846", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 45 ]
[ null ]
[ 17 ]
[ 82 ]
2024-11-18T19:14:26.846393+00:00
1,541,794,862,000
86c821656f1a404f4c031e9fb8857d5837b1eb6e
2
{ "blob_id": "86c821656f1a404f4c031e9fb8857d5837b1eb6e", "branch_name": "refs/heads/master", "committer_date": 1541794862000, "content_id": "cf55ff3051e5754721e086407968e956d1693546", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a8a227f4d1559d07ea572a31e662b30a635e07ed", "extension": "py"...
2.328125
stackv2
import subprocess import argparse import datetime import time import os class OSBuild(object): def __init__(self, build_version): self._build_version = build_version self._datetime = datetime.datetime.now() self._pubdate = datetime.datetime.now().strftime("%m-%d-%Y") self._dt = s...
101
35.05
80
18
902
python
[{"finding_id": "codeql_py/overly-permissive-file_abf4db0697aecb7c_cc85408f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 50 ]
[ null ]
[ 9 ]
[ 38 ]
2024-11-18T19:14:42.514615+00:00
1,551,305,297,000
752aeb596e644cf120664a4dfd9ae2be6fdff56d
3
{ "blob_id": "752aeb596e644cf120664a4dfd9ae2be6fdff56d", "branch_name": "refs/heads/master", "committer_date": 1553013509000, "content_id": "77ebe653cea676a52c2dac4505b168265fbfc819", "detected_licenses": [ "MIT" ], "directory_id": "4246a87203fcc3fe807268811f09ea6710442ed0", "extension": "py", "fi...
2.703125
stackv2
# Copyright (c) 2019 AT&T Intellectual Property. All rights reserved. from functools import wraps from http import HTTPStatus import flask import requests import json class Aaf(object): """ Represents the AAF home server """ def __init__(self, service_user, service_password, service_realm, root_uri='h...
145
34.63
119
15
1,074
python
[{"finding_id": "codeql_py/partial-ssrf_e7b02ead448837b8_41200803", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
3
true
[ "CWE-918", "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 77, 100, 124 ]
[ 82, 105, 129 ]
[ 16, 16, 16 ]
[ 14, 14, 14 ]
2024-11-18T19:27:34.965573+00:00
1,403,664,475,000
8e17c1c433954089ec2cbd897bbddb2fba2719aa
3
{ "blob_id": "8e17c1c433954089ec2cbd897bbddb2fba2719aa", "branch_name": "refs/heads/master", "committer_date": 1403664475000, "content_id": "896ed638d8207679f1443fa28460560c76560936", "detected_licenses": [ "MIT" ], "directory_id": "734738c4dd12632f521c9951571011de0e06c842", "extension": "py", "fi...
2.65625
stackv2
import time import logging from base import Base as Uploader log = logging.getLogger(__name__) class SFtpUploader(Uploader): ''' SFTP Upload handler, see parent class for more info ''' default_port = 22 connect_attempt_count = 0 upload_attempt_count = 0 sftp = None ssh_client = None ...
127
35.46
107
17
954
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5fa8402627b0cbb5_7d5db891", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 30 ]
[ null ]
[ 9 ]
[ 78 ]
2024-11-18T19:27:43.301842+00:00
1,606,042,988,000
360188aafd4522191e35eeb034e8fdea12e03415
2
{ "blob_id": "360188aafd4522191e35eeb034e8fdea12e03415", "branch_name": "refs/heads/main", "committer_date": 1606042988000, "content_id": "37c668478a987a8052e8d83dedbc517e2580c3fb", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c21ac2a5cf095b69d34a20b70be54bee79f0495c", "extension": "py"...
2.375
stackv2
import requests import os import json from urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning) ports = os.environ.get('PORTS') urls = ['https://{0}'.format(os.environ.get('DOMAIN'))] try: ports = ports.strip(' ').split(',') for port in po...
120
25.82
136
23
725
python
[{"finding_id": "codeql_py/request-without-cert-validation_ec40c30381c9ebb0_eb6866ee", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 96 ]
[ null ]
[ 28 ]
[ 98 ]
2024-11-18T19:38:56.647149+00:00
1,418,711,129,000
d7a12b54e3c67039d0c7bfd4e67d7c983ff80b5a
2
{ "blob_id": "d7a12b54e3c67039d0c7bfd4e67d7c983ff80b5a", "branch_name": "refs/heads/master", "committer_date": 1418711129000, "content_id": "8262f26397ff0e9298d1f5949f25cbb25241316d", "detected_licenses": [ "MIT" ], "directory_id": "bb2b4807a7f26e3621c471508f2aaa9a5c7ec22d", "extension": "py", "fi...
2.328125
stackv2
from __future__ import print_function import sys import yaml import pprint from jinja2 import Environment, FileSystemLoader if __name__ == '__main__': import argparse parser = argparse.ArgumentParser() parser.add_argument('infile', nargs='?', type=argparse.FileType('r'), defaul...
31
22.13
66
12
155
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_50b576845dbbf8f9_dfa966de", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 28 ]
[ null ]
[ 11 ]
[ 60 ]
2024-11-18T20:06:15.076307+00:00
1,470,367,343,000
8aec87b61fdbffedb34355409d87d998cf3fc411
2
{ "blob_id": "8aec87b61fdbffedb34355409d87d998cf3fc411", "branch_name": "refs/heads/master", "committer_date": 1470367343000, "content_id": "b5da6789a816be1365f3720ad15303adc2f01632", "detected_licenses": [ "MIT" ], "directory_id": "8be24cee32380102b3ebf90a55db9bff2e632000", "extension": "py", "fi...
2.375
stackv2
# encoding: UTF-8 import hashlib import zlib import json from time import sleep from threading import Thread import websocket # OKCOIN网站 OKCOIN_CNY = 'wss://real.okcoin.cn:10440/websocket/okcoinapi' OKCOIN_USD = 'wss://real.okcoin.com:10440/websocket/okcoinapi' # 账户货币代码 CURRENCY_CNY = 'cny' CURRENCY_USD = 'usd...
382
31.61
99
16
2,603
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3d3a6530f56a3744_cfcf84ce", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 121 ]
[ null ]
[ 28 ]
[ 48 ]
2024-11-18T20:06:26.202214+00:00
1,490,196,280,000
c3ab06849485444da87c8b17a8ba79a5fc71bec4
3
{ "blob_id": "c3ab06849485444da87c8b17a8ba79a5fc71bec4", "branch_name": "refs/heads/master", "committer_date": 1490196280000, "content_id": "eb8e0a3a09baec5377c22ad5904aa4299308fe85", "detected_licenses": [ "MIT" ], "directory_id": "bab0cf575d1734cf6c50593bc8e26288b7f4316d", "extension": "py", "fi...
2.859375
stackv2
import json from string import capwords import sys from http.server import HTTPServer, BaseHTTPRequestHandler import ssl import urllib.request class MyHTTPRequestHandler(BaseHTTPRequestHandler): def __tabulate_results(self, json_obj): col_width = len(max(json_obj, key=len)) table = '' fo...
88
27.32
78
19
570
python
[{"finding_id": "codeql_py/partial-ssrf_10306b81776fa502_f89cc0c7", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 29 ]
[ 32 ]
[ 16 ]
[ 10 ]
2024-11-18T20:06:26.478729+00:00
1,502,872,283,000
e7c72ac45bdd966b492ed78b25d56bace7a814b9
3
{ "blob_id": "e7c72ac45bdd966b492ed78b25d56bace7a814b9", "branch_name": "refs/heads/master", "committer_date": 1502872283000, "content_id": "54ad8aa4c23d6927e745d790bc0f3af9fb104490", "detected_licenses": [ "ISC" ], "directory_id": "5e7226af7d9921402b4e642bdac4a04e417363c5", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python # Scroll # Developed by acidvegas in Python # https://github.com/acidvegas/scroll # irc.py import glob import os import random import socket import ssl import threading import time import config import database import debug import functions # Globals ascii_dir = os.path.join('data', 'ascii') #...
344
31.72
121
34
3,006
python
[{"finding_id": "codeql_py/insecure-protocol_d34e982df1d158ce_5285434f", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 94 ]
[ null ]
[ 16 ]
[ 19 ]
2024-11-18T20:06:30.302689+00:00
1,563,016,594,000
d14f7da9f2c5b03306d4d0234b38ba5dfbeb1e40
2
{ "blob_id": "d14f7da9f2c5b03306d4d0234b38ba5dfbeb1e40", "branch_name": "refs/heads/master", "committer_date": 1563016594000, "content_id": "d7e93a8b6d25ab9dadb139747dddc3784799c7ba", "detected_licenses": [ "MIT" ], "directory_id": "6c24823b142bc519bdf5421ac701d9ad17955b12", "extension": "py", "fi...
2.390625
stackv2
import re import logging import smtplib from . import passport_blu from email.mime.text import MIMEText from email.header import Header from flask import request, session from flask import current_app, jsonify from flask import make_response from info import redis_store, db from info.utils.captcha.captcha import captch...
251
24.43
109
15
1,661
python
[{"finding_id": "codeql_py/polynomial-redos_adfb96071320d2f7_86ab52a2", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '0' and with many repetitions of '0'." ]
[ 70 ]
[ null ]
[ 103 ]
[ 108 ]
2024-11-18T20:18:36.807551+00:00
1,627,177,940,000
52bda2b9373885ffdba68c26064ee4d6560a9784
4
{ "blob_id": "52bda2b9373885ffdba68c26064ee4d6560a9784", "branch_name": "refs/heads/main", "committer_date": 1627177940000, "content_id": "8bb0f894fe6010279caff030909b511f10413516", "detected_licenses": [ "MIT" ], "directory_id": "1fc895c372e504a6ac396f28f3358f7e6e623a6a", "extension": "py", "file...
3.65625
stackv2
#!/usr/bin/python // 파이썬을 위한 파일임을 선언 # -*- coding: utf8 -*- // 인코딩 방식 지정 => 한글 주석으로 인한 실행 에러 방지 # 반복문 : for : 반복 횟수 예측 가능 # while : 반복 횟수 예측 불가능 # for : 사전에 또는 특정 상황에 맞춰서 미리 반복횟수 설정 # while : 특정 조건에 도달할 때까지 반복한다. # 사용법 # 초기값 ---> while 반복문에서 빠져나오기 위해 사용되는 변수 # while (조건문) : ---> 결과 : T / F # 코드블...
135
18.5
58
12
1,147
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_caa8b330691c2cf5_27624c22", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]...
[ 132 ]
[ null ]
[ 11 ]
[ 18 ]
2024-11-18T20:31:14.437500+00:00
1,580,625,742,000
72f665b5a1c3c2272892c3315145ccb5d484169c
3
{ "blob_id": "72f665b5a1c3c2272892c3315145ccb5d484169c", "branch_name": "refs/heads/master", "committer_date": 1580625742000, "content_id": "ff4b0a917566d65980f031614d524ee6a17893d5", "detected_licenses": [ "MIT" ], "directory_id": "413a515d28f34e7efafe68a963f8fa530176e608", "extension": "py", "fi...
2.59375
stackv2
import base64 import pickle from django.shortcuts import render # Create your views here. from django_redis import get_redis_connection from rest_framework import status from rest_framework.response import Response from rest_framework.views import APIView from cart import constants from cart.serializers import CartS...
368
31.07
103
19
3,172
python
[{"finding_id": "codeql_py/unsafe-deserialization_25850338b8d8b1ba_ad23d7b5", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depen...
5
true
[ "CWE-502", "CWE-502", "CWE-502", "CWE-502", "CWE-502" ]
[ "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided valu...
[ 69, 136, 208, 279, 352 ]
[ null, null, null, null, null ]
[ 42, 38, 38, 42, 42 ]
[ 71, 67, 67, 71, 71 ]
2024-11-18T20:31:16.958614+00:00
1,606,043,068,000
1b3e3d9cd191238a97df6205999d046c2d54ac7e
2
{ "blob_id": "1b3e3d9cd191238a97df6205999d046c2d54ac7e", "branch_name": "refs/heads/master", "committer_date": 1606043068000, "content_id": "c9b930eaa7b7139b75f44eed2dab14ef10227996", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "5e9c8198c909633f218806ccb5736bef3a0825d0", "extension": "p...
2.390625
stackv2
import requests import os import json from urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning) default_payload = '../../../../../../../../etc/hosts' ports = os.environ.get('PORTS') urls = ['https://{0}/'.format(os.environ.get('DOMAIN'))] try: ...
58
29.95
95
16
423
python
[{"finding_id": "codeql_py/request-without-cert-validation_9d6edbf331cdba93_4a98a243", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 50 ]
[ null ]
[ 35 ]
[ 87 ]
2024-11-18T20:31:22.847682+00:00
1,506,717,651,000
c990eb05d8231ec91b83319ccefc55457244f17c
3
{ "blob_id": "c990eb05d8231ec91b83319ccefc55457244f17c", "branch_name": "refs/heads/master", "committer_date": 1506717651000, "content_id": "66cf2728e7d490d781e3ea6b68774173bf30f74c", "detected_licenses": [ "MIT" ], "directory_id": "a559b40eb24c15b37d7ece1a8f0ba7920c71404c", "extension": "py", "fi...
2.65625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ """ import cv2 import numpy as np from argparse import ArgumentParser from simplejson import load from os import system from datetime import datetime, date, timedelta try: from urllib.request import Request, urlopen # Python 3 except ImportError: from urllib2...
254
33.87
79
16
2,004
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_35855686d6ce38f0_1fe39327", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 185 ]
[ 190 ]
[ 15 ]
[ 52 ]
2024-11-18T20:43:27.932768+00:00
1,492,600,413,000
6cc057eed7dc9f41e03a9cb529c730b3035675a7
3
{ "blob_id": "6cc057eed7dc9f41e03a9cb529c730b3035675a7", "branch_name": "refs/heads/master", "committer_date": 1492600413000, "content_id": "a74b83cab26aed0e11fb8b775daf530014d38b90", "detected_licenses": [ "Apache-2.0" ], "directory_id": "057554afbdfec2f8689a999a15ba0848c620ab4f", "extension": "py"...
2.578125
stackv2
#!/usr/bin/env python2.7 from flask import Flask, request, jsonify import json, datetime import sys, os from string import Template import xml.etree.ElementTree as ET import subprocess import requests import sys reload(sys) sys.setdefaultencoding("utf-8") import getpass import csv, codecs import argparse import dateti...
263
41.22
177
22
2,857
python
[{"finding_id": "codeql_py/flask-debug_e5d8c71a299b20e6_e324e6d0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-215", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", ...
[ 256, 259, 34, 67, 70 ]
[ null, null, null, null, null ]
[ 6, 7, 16, 20, 20 ]
[ 59, 60, 110, 78, 168 ]
2024-11-18T20:43:30.608312+00:00
1,571,690,232,000
67fe78efc8355438c937bdf7412c6d3da8218dc4
3
{ "blob_id": "67fe78efc8355438c937bdf7412c6d3da8218dc4", "branch_name": "refs/heads/master", "committer_date": 1571690232000, "content_id": "39645abdc62eb2baa9dab0cacd61bf7b36e8096d", "detected_licenses": [ "MIT" ], "directory_id": "58c5fbac8b14bd6575fa9a9a24ac697b2dd312c3", "extension": "py", "fi...
2.8125
stackv2
import requests import typing import logging BASE_EMOJI_URL = "https://unicodey.com/emoji-data/img-google-64/{image_link}" EMOJI_API_URL = "https://slack.com/api/emoji.list?token={oauth_token}" logger = logging.getLogger() class EmojiUrlGenerator: def __init__(self, default_emoji_list: typing.L...
41
37.29
91
16
346
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bd92c5799e807d67_ab2c8c77", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 51 ]
[ 66 ]
2024-11-18T20:43:32.852669+00:00
1,575,557,119,000
640755fdb13b597443df8f1445edd9a77c985157
2
{ "blob_id": "640755fdb13b597443df8f1445edd9a77c985157", "branch_name": "refs/heads/master", "committer_date": 1575557119000, "content_id": "ce7fe4aaa39b3bb6b4488a08d89e251b60a7d18b", "detected_licenses": [ "MIT" ], "directory_id": "249e8641cd9adcf37b5509a8b2ac396ada1db14d", "extension": "py", "fi...
2.5
stackv2
import os import HP def main(): # create directory for patient if not os.path.exists(HP.insight_patient_data_directory): os.makedirs(HP.insight_patient_data_directory) else: raise IOError # get the patient file and store it into multiple files (one file per sentence) f = open(HP.dat...
38
39.13
118
17
354
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_499c84e583e190a1_b116885c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 34 ]
[ null ]
[ 55 ]
[ 98 ]
2024-11-18T20:43:53.355157+00:00
1,512,277,969,000
1f3601638a91742e4e375e0beab835dba4fa366e
2
{ "blob_id": "1f3601638a91742e4e375e0beab835dba4fa366e", "branch_name": "refs/heads/master", "committer_date": 1512277969000, "content_id": "8800ebe371a32d00a3cb9a52a30adb483bd439cc", "detected_licenses": [ "MIT" ], "directory_id": "b771ac7f9d5e6ec0a82eda26af36c6554ffd1c5f", "extension": "py", "fi...
2.359375
stackv2
# Python module to interface with Shenzhen Xenon ESP8266MOD WiFi smart devices # E.g. https://wikidevi.com/wiki/Xenon_SM-PW701U # SKYROKU SM-PW701U Wi-Fi Plug Smart Plug # Wuudi SM-S0301-US - WIFI Smart Power Socket Multi Plug with 4 AC Outlets and 4 USB Charging Works with Alexa # # This would not exist without th...
300
41.97
160
18
3,343
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_edca1f1ce3a6d24d_a2040ff5", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 53 ]
[ null ]
[ 28 ]
[ 47 ]
2024-11-18T20:43:53.423053+00:00
1,556,625,583,000
57a9f1d7f6dd9a98c7054cf155493c0061771b21
2
{ "blob_id": "57a9f1d7f6dd9a98c7054cf155493c0061771b21", "branch_name": "refs/heads/master", "committer_date": 1556625583000, "content_id": "48e89abe5d3f6ac184adb3ff6c03a8fb7d76d310", "detected_licenses": [ "MIT" ], "directory_id": "f935aeff1a7c465fedf1d1d9ac829eff357f4801", "extension": "py", "fi...
2.5
stackv2
from flask import render_template, url_for, flash, redirect, request, abort from blog.forms import RegistrationForm, LoginForm, PostForm, CommentForm from blog.models import User, Post, Comment from blog import app, db, bcrypt from flask_login import login_user, logout_user, current_user, login_required import requests...
131
32.31
97
16
935
python
[{"finding_id": "codeql_py/url-redirection_f670331500f4ba30_06a8c4a2", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 47 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-18T20:44:11.166167+00:00
1,515,165,238,000
6c56b558fec343fe24b6585dccf51c500ffbf5ba
2
{ "blob_id": "6c56b558fec343fe24b6585dccf51c500ffbf5ba", "branch_name": "refs/heads/master", "committer_date": 1515165238000, "content_id": "e631b7c56d1094fbfc994f792179de600f2fa9c1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "acddacb76e8452835ed9a2903805fb0aedf98c69", "extension": "py"...
2.390625
stackv2
import argparse import random import logging from flask import Flask, request, abort from solver import JumpGameSolver, SolverInputException app = Flask(__name__) app.config.from_object('server_config') solver = None # type: JumpGameSolver @app.route('/', methods=['POST'], strict_slashes=False) def handler(): ...
104
29.66
77
15
714
python
[{"finding_id": "codeql_py/log-injection_e246a30dbb869034_644bb218", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 49 ]
[ 55 ]
2024-11-18T20:57:55.799309+00:00
1,462,825,196,000
c425d9ce3738b3d70a0f2fa3bcedeec54941368e
3
{ "blob_id": "c425d9ce3738b3d70a0f2fa3bcedeec54941368e", "branch_name": "refs/heads/master", "committer_date": 1462825196000, "content_id": "96b74ca17b74552c4a92693e68cfef95b7e15d85", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "8b88e0955ce4a3a39fd52cabfd1d9df0b6ecab1f", "extension": "p...
2.546875
stackv2
import numpy as np import matplotlib.pyplot as plt import matplotlib.mlab as mlab import pysox import subprocess as sp import time import os import re from ._base_module import BaseModule class FftAnalysis(BaseModule): def __init__(self, connector): super(FftAnalysis, self).__init__(connector) sel...
80
33.38
85
16
620
python
[{"finding_id": "codeql_py/overly-permissive-file_58621313c9729a45_0a33b22f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 39 ]
[ null ]
[ 9 ]
[ 36 ]
2024-11-18T20:57:58.692664+00:00
1,593,715,268,000
7be8d98ee3af66f58683e82f5817dd3865e63165
3
{ "blob_id": "7be8d98ee3af66f58683e82f5817dd3865e63165", "branch_name": "refs/heads/master", "committer_date": 1593715268000, "content_id": "feda459c8123407cf53096f28c805421e375f313", "detected_licenses": [ "MIT" ], "directory_id": "9ea87c10180665db0db6fa36997704acc001692d", "extension": "py", "fi...
3.140625
stackv2
#!/usr/bin/python3 # used to encrypt a byte string # used as a tool for testing # AES encryption from Crypto.Cipher import AES import base64 import os import sys import binascii def rawpad(s,BLOCK_SIZE): #pad it with the characters representing original block size length return s + (BLOCK_SIZE - len(s) % BL...
107
28.36
95
15
953
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_004e57db80dc6087_12143fef", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode CTR](2) is broken or weak, and should not be used.\n[The block mode ECB](3) is broken or weak, and should not be used.\n[The block mode CBC](4) is broken or weak, and should not be used.\n[The block mode CTR](5) is broken or weak, ...
[ 80, 103 ]
[ null, null ]
[ 10, 10 ]
[ 33, 33 ]
2024-11-18T20:58:05.441268+00:00
1,616,428,347,000
da67b8b2b68fbb036649007b95078d8fae050184
2
{ "blob_id": "da67b8b2b68fbb036649007b95078d8fae050184", "branch_name": "refs/heads/main", "committer_date": 1616428347000, "content_id": "a6d39e1e2d4a16721dcc3c6105f9f97f6fbfb9fc", "detected_licenses": [ "MIT" ], "directory_id": "6938cdd2b41ca2af38c35a95e0fad91315b20ad1", "extension": "py", "file...
2.453125
stackv2
import os import shutil import time from os.path import splitext from pathlib import Path from urllib.parse import urlsplit import requests import urllib3 from PIL import Image from dotenv import load_dotenv from instabot import Bot def download_image(url, image_name, images_folder='images'): response = get_resp...
176
27.85
74
14
1,160
python
[{"finding_id": "codeql_py/request-without-cert-validation_57e1f6240c799c65_01e85a60", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 63 ]
[ null ]
[ 16 ]
[ 55 ]
2024-11-18T20:58:35.037589+00:00
1,627,618,019,000
8fedfffea882f388f9d0d6ff0b5ea3cfb7e6b0fb
2
{ "blob_id": "8fedfffea882f388f9d0d6ff0b5ea3cfb7e6b0fb", "branch_name": "refs/heads/master", "committer_date": 1627618019000, "content_id": "9a9b7219434dbf2df325929a4496325714a0938c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "48a1decfc9916c837dbfb6c8c2419d8124f45ee1", "extension": "py"...
2.453125
stackv2
# To add default values in config - python collection_config.py # To add customised config - python collection_config.py -a "1.1.1.1" -u "Admin" -p "admin" -d "OVAD" -i "1.1.2.2" -v 3200 -w "Synergy" -l oneview-ansible-collection import argparse import os config_file = 'oneview_config.json' def replace_config_file(co...
64
40.06
165
13
638
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_85824bfacee6df42_15775625", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 10 ]
[ null ]
[ 19 ]
[ 25 ]
2024-11-18T20:58:35.559700+00:00
1,526,907,158,000
cbfd2de3851517aeee9bc01695b27a744553a6ff
3
{ "blob_id": "cbfd2de3851517aeee9bc01695b27a744553a6ff", "branch_name": "refs/heads/master", "committer_date": 1526907158000, "content_id": "0dd0a143851eca5dc3426b33cd9527fde9a2eff4", "detected_licenses": [ "MIT" ], "directory_id": "19c70ba188159e4ff9a1b15b3b2e14ad96dd1479", "extension": "py", "fi...
2.703125
stackv2
import re import glob import random from pathlib import Path import os import json import time dictionary_pattern = "(?:\')+([0-9a-zA-Z]{1,})+(?:\')" root_name = "dataset/groups" consumed_root_name = "consumed/groups" dicitonary_addr = "dataset/dictionaries/" dictionary_tags = dicitonary_addr + 'tags.txt' #Addresses ...
235
25.56
123
19
1,517
python
[{"finding_id": "codeql_py/redos_2dc47ff2fb84dfb3_d37404d2", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetitions of '0'." ]
[ 9 ]
[ null ]
[ 30 ]
[ 45 ]
2024-11-18T21:10:11.747427+00:00
1,544,006,585,000
3ebfb605d373d920ed62bdb990cf86b9bdc554cc
2
{ "blob_id": "3ebfb605d373d920ed62bdb990cf86b9bdc554cc", "branch_name": "refs/heads/master", "committer_date": 1544006585000, "content_id": "12a3d61d9fc29da9f103bde445ad575320eaabda", "detected_licenses": [ "MIT" ], "directory_id": "c1117b47bd9c328dfcbc1045050001ab5f30f87a", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, request, render_template, url_for, flash, g from flask_cors import CORS from flask_restful import Resource, Api import json import requests from deliveryDB import Database import mysql.connector app = Flask(__name__) api = Api(app) app.config["SECRET_KEY"] = "mysecret" # Pass inn app.config ...
172
27.95
86
17
1,256
python
[{"finding_id": "codeql_py/flask-debug_225c16f2a3a4210c_21c4d08e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 172, 162, 168 ]
[ null, null, null ]
[ 5, 12, 12 ]
[ 53, 74, 39 ]
2024-11-18T21:10:23.714012+00:00
1,488,338,336,000
50b8d8e67eb3102a67f34ae6248c27ec51e94cf0
3
{ "blob_id": "50b8d8e67eb3102a67f34ae6248c27ec51e94cf0", "branch_name": "refs/heads/master", "committer_date": 1488338336000, "content_id": "e9deb8e5ba4e4a0f23684312cfa915d5ca3a3d63", "detected_licenses": [ "MIT" ], "directory_id": "16429e9c81ea35097fe8dae4445d1975539e9ee5", "extension": "py", "fi...
3.34375
stackv2
# pylint: disable=C0103 """ Take an input image Hide text in the image Optional password """ import sys import struct import os import base64 from PIL import Image import numpy as np import bitarray as ba from Crypto.Cipher import AES def encrypt_string(inputString, key=None): """ encrypts inputString using ...
76
23.53
77
18
502
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cc202356a86b0363_93531c07", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 32 ]
[ null ]
[ 22 ]
[ 27 ]
2024-11-18T21:10:27.776135+00:00
1,468,512,830,000
08865caa7ff6a780cc4b7fb46fe7141e8ac37b73
3
{ "blob_id": "08865caa7ff6a780cc4b7fb46fe7141e8ac37b73", "branch_name": "refs/heads/master", "committer_date": 1468512830000, "content_id": "b4b2b6012f118d91ff59b5b8f71aa372094e8372", "detected_licenses": [ "Apache-2.0" ], "directory_id": "35f9ba79f017ad056235a7a33d6220c6ab5c88b5", "extension": "py"...
2.640625
stackv2
""" Provides simple templating for Mondrian XML files. In the future the XSD file for the Mondrian schema might be used. """ from jinja2 import Environment, PackageLoader def level_type(level_type): """ Custom filter for mapping the pylytics dimension type to a Mondrian type. """ return ('Numeric' ...
45
25.62
75
13
270
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1576d1f9876bf5b8_d867629d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 27 ]
[ 32 ]
[ 11 ]
[ 10 ]
2024-11-18T21:10:28.952138+00:00
1,599,871,435,000
ed76b8a98f2d58a1f10e9a25548851a1a04347e1
3
{ "blob_id": "ed76b8a98f2d58a1f10e9a25548851a1a04347e1", "branch_name": "refs/heads/master", "committer_date": 1621181568000, "content_id": "44ccdb728a86bd18a6b0227c0ca1fad5b9fb2993", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "27b99f002b35d22afa52d2db3410be57c114c007", "extension": "p...
3.09375
stackv2
import os from functools import partial from pluginbase import PluginBase # For easier usage calculate the path relative to here. here = os.path.abspath(os.path.dirname(__file__)) get_path = partial(os.path.join, here) # Setup a plugin base for "example.modules" and make sure to load # all the default built-in plug...
79
33.41
74
16
600
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1b410dcbd6cfd51c_7558ed3e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 75 ]
[ null ]
[ 15 ]
[ 43 ]
2024-11-18T21:10:30.824738+00:00
1,619,204,973,000
dc5bf3d26427aaee1ae688dadebf4823ec269088
3
{ "blob_id": "dc5bf3d26427aaee1ae688dadebf4823ec269088", "branch_name": "refs/heads/master", "committer_date": 1619204973000, "content_id": "9f0eca21d19448da375c8443b99329a07868fc21", "detected_licenses": [ "MIT" ], "directory_id": "3b1053ea38fee9a59d335dd75bb6a6906d298594", "extension": "py", "fi...
2.671875
stackv2
import datetime import gzip import os import re import shutil import subprocess import sys import tarfile import tempfile from random import choice from string import ascii_letters, ascii_lowercase, digits from typing import Iterable, Union import arrow RE_STATIC_HASH = re.compile("^main.([a-z0-9]+).css$") SUB_DIRS ...
304
23.62
120
16
1,809
python
[{"finding_id": "codeql_py/tarslip_279eb6f5ddda737f_5690d01c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 148 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T21:10:48.364977+00:00
1,514,633,924,000
3b5782200360c21282a206788e411c8da86a6384
2
{ "blob_id": "3b5782200360c21282a206788e411c8da86a6384", "branch_name": "refs/heads/master", "committer_date": 1514633924000, "content_id": "71731bd2a05b551c08d22169e487b58d863aed8a", "detected_licenses": [ "MIT" ], "directory_id": "ac9ac7c85dc91149cf5b277e142e7333fdf23224", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/env python import os import sys import yaml import json import requests import datetime as dt import shutil from requests.auth import HTTPBasicAuth #from BeautifulSoup4 import BeautifulSoup #from more_itertools import unique_everseen #from urlparse import urljoin class pyFS(object): """ForeScout Web...
325
37.39
130
20
2,812
python
[{"finding_id": "codeql_py/request-without-cert-validation_72c4de54861f9849_776b516a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
10
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 99, 117, 124, 138, 154, 214, 231, 253, 266, 317 ]
[ null, null, null, null, null, null, null, null, null, null ]
[ 13, 13, 21, 17, 20, 20, 24, 20, 20, 20 ]
[ 92, 92, 115, 111, 73, 73, 77, 73, 73, 73 ]
2024-11-18T21:10:50.703405+00:00
1,494,615,108,000
cf76a556c160b2cbe967730008be441c01dda2b7
3
{ "blob_id": "cf76a556c160b2cbe967730008be441c01dda2b7", "branch_name": "refs/heads/master", "committer_date": 1494615108000, "content_id": "5850803c8fb53a491c1b926e3854d8c8f9e34b68", "detected_licenses": [ "MIT" ], "directory_id": "cfd4fdc997686f17599422bc7f16ddcb966e8e6e", "extension": "py", "fi...
2.703125
stackv2
import random import hashlib from string import letters from google.appengine.ext import db def make_salt(length = 5): return ''.join(random.choice(letters) for x in xrange(length)) def make_pw_hash(name, pw, salt = None): if not salt: salt = make_salt() h = hashlib.sha256(name + pw + salt).hexdigest() return '...
80
26.15
77
15
539
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7d40908e5f8c425b_02314a21", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 12 ]
[ null ]
[ 21 ]
[ 37 ]
2024-11-18T19:03:21.755964+00:00
1,624,457,876,000
3de0f67bf61f29762b8a11f352c4767efa13ab34
3
{ "blob_id": "3de0f67bf61f29762b8a11f352c4767efa13ab34", "branch_name": "refs/heads/main", "committer_date": 1624457876000, "content_id": "b9fa12e6fb680590385f018a2f211229c7d85f37", "detected_licenses": [ "MIT" ], "directory_id": "08b0c54b66addc4a968fa245662ee3f63a3752bc", "extension": "py", "file...
3.21875
stackv2
# %% # import libraries import os import csv from pathlib import Path from datetime import datetime from collections import Counter ROOT_PATH = Path(os.path.dirname(__file__)).parent # %% # read mimic data # Include demographics (Gender, Date of Birth, Ethnicity) patients_data_path = f'{ROOT_PATH}/data/mimic/PATIENTS....
210
29.03
147
13
2,228
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d25ba4ed5782bfc9_b3713e5b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 105, 108 ]
[ null, null ]
[ 7, 7 ]
[ 31, 30 ]
2024-11-18T19:03:22.262609+00:00
1,491,607,452,000
bab970cbc54b578911681b41b0af65df8c86ef29
3
{ "blob_id": "bab970cbc54b578911681b41b0af65df8c86ef29", "branch_name": "refs/heads/master", "committer_date": 1491607452000, "content_id": "86946924b2912f755ed4571cd017b3b56e7dd364", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "5c78ee27530a47d56164aab72548ce4ff0523c5e", "extension": "p...
2.71875
stackv2
import argparse import os import csv import pickle import re import string from collections import defaultdict import operator import copy import time import pandas as pd parser = argparse.ArgumentParser(description='early modern standardizer (VARD alternative) - works on early modern english text files') parser.add_a...
299
43.44
137
29
2,847
python
[{"finding_id": "codeql_py/overly-large-range_3264c40436ec1cb0_1f06954b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 181, 181 ]
[ null, null ]
[ 37, 61 ]
[ 40, 64 ]
2024-11-18T19:03:29.381072+00:00
1,587,949,774,000
d1635756cd26c53c31c7741f2dd1d1d755e9601e
2
{ "blob_id": "d1635756cd26c53c31c7741f2dd1d1d755e9601e", "branch_name": "refs/heads/master", "committer_date": 1587949774000, "content_id": "aebb7583fc2c4cf325bd252afb4f33ea823cc085", "detected_licenses": [], "directory_id": "ab62d2707cdd7beba56004321ad39d7f5fedc751", "extension": "py", "filename": "rou...
2.328125
stackv2
""" Routes ~~~~~~ """ from flask import Blueprint from flask import flash from flask import redirect from flask import render_template from flask import request from flask import current_app from flask import url_for from flask_login import current_user from flask_login import login_required from flask_login im...
340
28.25
150
17
2,288
python
[{"finding_id": "codeql_py/url-redirection_8395f40127d0d639_9a2537ef", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 192 ]
[ null ]
[ 25 ]
[ 74 ]
2024-11-18T19:28:35.987978+00:00
1,523,348,655,000
c1fb2def3fe644d4e73f27fb7cbe6ca5d83037c5
2
{ "blob_id": "c1fb2def3fe644d4e73f27fb7cbe6ca5d83037c5", "branch_name": "refs/heads/master", "committer_date": 1523348655000, "content_id": "7cbde1d3a11762d03018d93df6b39522d8805a4c", "detected_licenses": [ "MIT" ], "directory_id": "8e3f92951374ba05085d9f4fe68da7cf7d90c3ce", "extension": "py", "fi...
2.5
stackv2
#coding:utf-8 import requests import json class RunMethod: def post_main(self,url,data,header=None): res = None if header !=None: res = requests.post(url=url,data=json.dumps(data),headers=header) else: res = requests.post(url=url,data=data) return res.json() def get_main(self,url,data=None,header=None)...
30
25.7
68
15
211
python
[{"finding_id": "codeql_py/request-without-cert-validation_79e2ee763f9b8526_096f02b3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 16, 18 ]
[ null, null ]
[ 10, 10 ]
[ 69, 54 ]
2024-11-18T19:28:47.823044+00:00
1,547,185,274,000
6c4b690b8e67134a2926c6c9acc9d43d7a2d6815
2
{ "blob_id": "6c4b690b8e67134a2926c6c9acc9d43d7a2d6815", "branch_name": "refs/heads/master", "committer_date": 1547185274000, "content_id": "903445e91df38a2c0791dd843d809ecde9c5f4f3", "detected_licenses": [ "MIT" ], "directory_id": "963b70d354dc81e783204e57dfee1fd47f956a00", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python import sys import pickle import tarfile import argparse from pathlib import Path import torch import torch.utils.data from urllib.request import urlopen import libs.augmentaion as augmentaion import libs.models as models class Dataset(object): def __init__(self, data, labels): self...
180
36.04
103
16
1,455
python
[{"finding_id": "codeql_py/tarslip_e7e75335cd6198eb_f0947f9d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 68 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T19:28:59.021814+00:00
1,431,965,689,000
be128dad6410e6cdb8d9573993626c76ad7b0ef8
3
{ "blob_id": "be128dad6410e6cdb8d9573993626c76ad7b0ef8", "branch_name": "refs/heads/master", "committer_date": 1431965689000, "content_id": "7995e1313ad697b39a57d7103ae515ef31aac251", "detected_licenses": [ "MIT" ], "directory_id": "360521fa169b9cde78f314558f86bc3c54d9bf1c", "extension": "py", "fi...
2.71875
stackv2
import os import sys import re import platform import gevent from gevent import monkey monkey.patch_all() import requests from lxml import etree from more_itertools import chunked from .utils import get_image_info, parse_url from .exceptions import URLParseError REQUEST_HEADERS = {'User-agent': 'Mozilla/5.0 (Maci...
145
24.43
155
18
912
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_a24143894814e8b4_dade68cd", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [ck101.com](1) may be at an arbitrary position in the s...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [ck101.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 29 ]
[ null ]
[ 8 ]
[ 26 ]
2024-11-18T19:39:59.596896+00:00
1,634,110,724,000
f1162c5ea0db78d29570021537806de7be70f0fe
2
{ "blob_id": "f1162c5ea0db78d29570021537806de7be70f0fe", "branch_name": "refs/heads/master", "committer_date": 1634110724000, "content_id": "cf6feedf74d93c9965292d357645157c97e2d355", "detected_licenses": [ "MIT" ], "directory_id": "82ab25a8039c9d2cb5fc51aac5b68142ff9e08aa", "extension": "py", "fi...
2.3125
stackv2
import os from flask import Flask, render_template_string, request, redirect, make_response import wargaming app = Flask(__name__) wot = wargaming.WoT(os.environ['WARGAMING_API'], language='ru', region='ru') HTML_TEMPLATE = """<!doctype html> <title>Wargaming AUTH</title> {% if error %} <p style="color: red">Error:...
62
25.48
86
14
443
python
[{"finding_id": "codeql_py/cookie-injection_11890cc85b12b6dd_d61ff6be", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/cookie-injection", "py/cookie-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "Cookie is constructed from a [user-supplied input](1)." ]
[ 56, 56 ]
[ null, null ]
[ 33, 36 ]
[ 34, 37 ]
2024-11-18T19:40:02.780172+00:00
1,559,154,341,000
2a592083505365a59568bd4b38d2b9e53477844b
2
{ "blob_id": "2a592083505365a59568bd4b38d2b9e53477844b", "branch_name": "refs/heads/master", "committer_date": 1559154341000, "content_id": "498af151e801449676f955bb4d522a479d43c188", "detected_licenses": [ "Unlicense" ], "directory_id": "6f2a6a935501cb2193d62bb77aed01f6e63d8f0c", "extension": "py",...
2.46875
stackv2
import requests from jinja2 import Template #use pip install jinja2 if you get a module error import sys import login import getpass import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) urllib3.disable_warnings(urllib3.exceptions.SNIMissingWarning) urllib3.disable_warnings(urllib3.exceptio...
69
30.83
96
10
540
python
[{"finding_id": "codeql_py/request-without-cert-validation_693e9a6d9c49e7db_9427094d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-079", "CWE-079" ]
[ "py/request-without-cert-validation", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 47, 31, 43 ]
[ null, null, null ]
[ 19, 14, 14 ]
[ 96, 35, 39 ]
2024-11-18T20:18:04.276590+00:00
1,635,976,351,000
8fb0e7c177782031c6327822664237af31e9a2c4
2
{ "blob_id": "8fb0e7c177782031c6327822664237af31e9a2c4", "branch_name": "refs/heads/main", "committer_date": 1635976351000, "content_id": "9f7b6dc6e1800d1c3347756f61657fb9bcbc7c9b", "detected_licenses": [ "MIT" ], "directory_id": "b7e67c532771365a15e968ca1e1dda712712fbe0", "extension": "py", "file...
2.4375
stackv2
from flask import Flask from flask_cors import CORS,cross_origin from smbus import SMBus import time import json import datetime # I2C simplified: 0x5E EE895ADDRESS = 0x5E I2CREGISTER = 0x00 app = Flask(__name__) def read_sensor_data(i2cbus): read_data = i2cbus.read_i2c_block_data(EE895ADDRESS, I2CREGISTER, 8)...
51
34.59
118
16
548
python
[{"finding_id": "codeql_py/stack-trace-exposure_aa715c65b8d6aefe_2fb0ed3e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 51 ]
[ null ]
[ 16 ]
[ 67 ]
2024-11-18T20:18:21.815451+00:00
1,601,901,254,000
1bad42c3492947e9df7db64014e25ab8022e0637
3
{ "blob_id": "1bad42c3492947e9df7db64014e25ab8022e0637", "branch_name": "refs/heads/master", "committer_date": 1601901254000, "content_id": "5dc226116176620ee8357949008676a08efd15e0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b12700aec6fca88ffeafd1452cbb11242f560354", "extension": "py"...
2.765625
stackv2
#!/usr/bin/python3 # # # ==================================================== # Python Blogger REST API v3 # ==================================================== # # # Author: # Suraj Singh Bisht # surajsinghbisht054@gmail.com # www.bitforestinfo.com # www.blaregro...
112
28.11
95
9
742
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_88ad702bcbfc27e1_1f0ee571", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 87, 97, 102 ]
[ null, null, null ]
[ 11, 11, 11 ]
[ 53, 57, 62 ]
2024-11-18T20:18:23.576010+00:00
1,689,781,839,000
edc30c2df378aad633d8474185728e09248d9c1f
2
{ "blob_id": "edc30c2df378aad633d8474185728e09248d9c1f", "branch_name": "refs/heads/main", "committer_date": 1689781839000, "content_id": "6bb6dcaff2ddb432f981d8f75d061fe8aec08336", "detected_licenses": [ "MIT" ], "directory_id": "25f8e3cdc0819c908da516f476ff4b0149cc374b", "extension": "py", "file...
2.5
stackv2
import os from tempfile import NamedTemporaryFile from zipfile import ZipFile from ozy import OzyError # TODO support sha256, sha256_signature and sha256_gpg_key from ozy.installer import Installer from ozy.utils import download_to_file_obj class SingleBinaryZipInstaller(Installer): def __init__(self, name, conf...
52
32.81
91
17
423
python
[{"finding_id": "codeql_py/overly-permissive-file_6ede78647684a60f_b3d61e25", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 33, 52 ]
[ null, null ]
[ 13, 9 ]
[ 38, 69 ]
2024-11-18T20:18:27.969661+00:00
1,444,226,418,000
370208083dfa1db37ecc54bafd59ad28da4afa54
2
{ "blob_id": "370208083dfa1db37ecc54bafd59ad28da4afa54", "branch_name": "refs/heads/master", "committer_date": 1444226418000, "content_id": "9164ff00e5a35f78a99012295dfa39140bb10e44", "detected_licenses": [ "MIT" ], "directory_id": "9a502e64f7d67fdf2c09a01b2c962efacb6005a1", "extension": "py", "fi...
2.34375
stackv2
# -*- coding: utf-8 -*- from principal.utils.GestionAlumnosUtils import secret_key import getpass import os BASE_DIR = os.path.dirname(os.path.abspath(__file__)) hosts = [] print('\nAllowed hosts\n') host = input('Please, enter the server IP address: ') hosts.append(host) database = {} attributes = {} print('\n...
117
30.56
86
14
930
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bb96ce97e1d45a31_0b659a93", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression stores [sensiti...
[ 89, 95 ]
[ null, null ]
[ 9, 9 ]
[ 78, 53 ]
2024-11-18T20:18:42.635905+00:00
1,552,028,835,000
bd14767ef134a66e2e1ddce1830df860ff669462
3
{ "blob_id": "bd14767ef134a66e2e1ddce1830df860ff669462", "branch_name": "refs/heads/master", "committer_date": 1552028835000, "content_id": "d73878c43a970b3fe9be73d84033267d20174846", "detected_licenses": [ "MIT" ], "directory_id": "8fff860b7b3097d27593694f4686be161ff3395d", "extension": "py", "fi...
2.859375
stackv2
import pandas as pd import csv import os import matplotlib.pyplot as plt daily_heart_data = pd.read_csv("dailyRestingHeartRate.csv") quarter_hour_heart_data = pd.read_csv("heartrate_15min.csv") hourly_steps = pd.read_csv("hourlySteps.csv") daily_steps = pd.read_csv("dailySteps.csv") sleep_data = pd.read_csv("sleep_sta...
41
32.32
85
9
362
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97121ff3b574c80b_91b58f5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 27 ]
[ null ]
[ 34 ]
[ 48 ]
2024-11-18T20:18:46.984371+00:00
1,613,073,873,000
71aee1c5f21b947e46ede634aa3b24853e217c11
3
{ "blob_id": "71aee1c5f21b947e46ede634aa3b24853e217c11", "branch_name": "refs/heads/master", "committer_date": 1613073873000, "content_id": "9db85634b8959adfc472e48b899101a0a299e464", "detected_licenses": [ "MIT" ], "directory_id": "c58b7658e1306246470b50d93eae71a46b90a718", "extension": "py", "fi...
2.625
stackv2
import re, string from nltk.corpus import stopwords def remove_emojis(data): # https://stackoverflow.com/a/58356570/6196010 emojis = re.compile("[" u"\U0001F600-\U0001F64F" # emoticons u"\U0001F300-\U0001F5FF" # symbols & pictographs u"\U0...
51
41.08
165
13
722
python
[{"finding_id": "codeql_py/overly-large-range_b4db010b179085c7_6b89d65c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
9
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 7, 7, 7, 7, 7, 7, 8, 8, 8 ]
[ null, null, null, null, null, null, null, null, null ]
[ 27, 30, 33, 36, 39, 42, 27, 30, 39 ]
[ 31, 34, 37, 40, 43, 46, 31, 34, 43 ]
2024-11-18T20:18:57.728471+00:00
1,616,756,689,000
2523c918321736dde8018cc6c84019282792ced8
2
{ "blob_id": "2523c918321736dde8018cc6c84019282792ced8", "branch_name": "refs/heads/main", "committer_date": 1616756689000, "content_id": "d01491893806d21798077aa26a3a7972556d4f8c", "detected_licenses": [ "MIT" ], "directory_id": "1028fd8b12200fdcb4f575677c16d8df026d94ac", "extension": "py", "file...
2.3125
stackv2
from blockchain import Blockchain import json from flask_cors import CORS, cross_origin from time import time blockchain = Blockchain() from flask import Flask, request app = Flask(__name__) CORS(app) @app.route('/chain', methods=['GET']) def chain(): return json.dumps([{'block':block, 'id':blockchain.getBlockI...
56
28.16
115
13
359
python
[{"finding_id": "codeql_py/reflective-xss_0946e8e40cc1c4c8_ca89a58b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 12 ]
[ 46 ]
2024-11-18T20:29:35.339030+00:00
1,612,068,108,000
b464ca29ec93703d50daddcb5e502949634a654f
3
{ "blob_id": "b464ca29ec93703d50daddcb5e502949634a654f", "branch_name": "refs/heads/master", "committer_date": 1612068108000, "content_id": "dcabc20cb0dfdcfa243850dfc19b600ffcf95260", "detected_licenses": [ "MIT" ], "directory_id": "2f4281da5b2e94da8304a78e90628c40e205b743", "extension": "py", "fi...
2.515625
stackv2
import re import requests from lxml import etree from requests.exceptions import ConnectionError class ParsePrem(): def __init__(self): super().__init__() self.js_id = None self.proxies = { "http": "http://127.0.0.1:54321", "https": "http://127.0.0.1:54321" ...
117
31.67
154
19
1,012
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03facc23d7b670d6_4f5182c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 116 ]
[ null ]
[ 11 ]
[ 27 ]
2024-11-18T20:29:52.097800+00:00
1,445,320,670,000
5414ecb1dfd0f0ba1436c92e44410af40fceecbc
2
{ "blob_id": "5414ecb1dfd0f0ba1436c92e44410af40fceecbc", "branch_name": "refs/heads/master", "committer_date": 1445320670000, "content_id": "26015e6f9252566e0265ece5221e14aaf6a61c87", "detected_licenses": [ "Apache-2.0" ], "directory_id": "aa7d8d08ba14de976d0202f103a644e41264da71", "extension": "py"...
2.390625
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- #Description: List all exam and its details of a specific course #Query String Variables: cid(course_id) #Operation: Create New Option, Modify Previously Created Exams #Created: April 18, 2015 #Last Modified: April 18, 2015 #Author: Optimus Prime print "Content-Type: text/htm...
92
32.71
148
16
834
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_86eac1c34be2ba62_3a80d1b0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ null ]
[ 15 ]
[ 51 ]
2024-11-18T20:29:55.051704+00:00
1,545,953,185,000
843b01a69a2230ef5590583b104ef7ddd81eb2f9
2
{ "blob_id": "843b01a69a2230ef5590583b104ef7ddd81eb2f9", "branch_name": "refs/heads/master", "committer_date": 1545953185000, "content_id": "4b5063fd7cde8331f32648f4a879e6f982f81ce1", "detected_licenses": [ "MIT" ], "directory_id": "20260f05d91340486ee1feace8fd35c8672be103", "extension": "py", "fi...
2.484375
stackv2
import sys import json from flask import Flask, request, jsonify, abort, send_from_directory, render_template from functools import wraps from ConfigImport import ConfigImport from Model import Model # define the constants and variables Config = ConfigImport() class QuestionHandler: def __init__(self, app): ...
40
36.3
111
20
276
python
[{"finding_id": "codeql_py/stack-trace-exposure_5f2f892cebf41460_94e611e4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 32 ]
[ 34 ]
[ 32 ]
[ 49 ]
2024-11-18T20:29:58.280975+00:00
1,497,287,686,000
a80f853cb9cfec419bfab2df6730d631b817862e
2
{ "blob_id": "a80f853cb9cfec419bfab2df6730d631b817862e", "branch_name": "refs/heads/master", "committer_date": 1497287718000, "content_id": "47c1850adab051d8879c71a5ee8f182263221865", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7c1906e0c0b90b0a96bd5be3d8d54f195e7f22bc", "extension": "py"...
2.421875
stackv2
import json import datetime import tornado.web import re from biothings.utils.www.analytics import GAMixIn from biothings.utils.common import is_str, is_seq try: from raven.contrib.tornado import SentryMixin except ImportError: # dummy class mixin class SentryMixin(object): pass try: from re im...
201
45.04
167
20
2,075
python
[{"finding_id": "codeql_py/log-injection_cb597628cf2d817e_2491d108", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)." ]
[ 67 ]
[ null ]
[ 31 ]
[ 35 ]
2024-11-18T20:51:33.551751+00:00
1,531,261,296,000
93b9133ba095caa0d05bfdeb81c7705900237385
3
{ "blob_id": "93b9133ba095caa0d05bfdeb81c7705900237385", "branch_name": "refs/heads/master", "committer_date": 1531261296000, "content_id": "a20c3ba00c008ed5d87792ff548fe34380ddaa1c", "detected_licenses": [ "MIT" ], "directory_id": "c52fe0ec977a650aa80afbccc58bd5674d7e5d70", "extension": "py", "fi...
2.75
stackv2
#!usr/bin/env python """ Basic use of SSL in the context of a regular cryptographic library """ import ssl import socket from pprint import pprint HOSTNAME = "www.python.org" context = ssl.create_default_context() context = ssl.SSLContext(ssl.PROTOCOL_SSLv23) context.verify_mode = ssl.CERT_REQUIRED context.check_ho...
22
23.59
85
9
129
python
[{"finding_id": "codeql_py/insecure-protocol_15ed97e364be99e6_20c0b5fd", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 18 ]
[ null ]
[ 8 ]
[ 15 ]
2024-11-18T20:51:45.692818+00:00
1,571,862,750,000
accc7e50ccf9c4c2cad95a9e75db989ebaf233a5
4
{ "blob_id": "accc7e50ccf9c4c2cad95a9e75db989ebaf233a5", "branch_name": "refs/heads/master", "committer_date": 1571862750000, "content_id": "d564381fc398ab266a8171abd13cc518bd884f43", "detected_licenses": [ "MIT" ], "directory_id": "05d5b1530d3a8ebf8fc50b7f4b56b764c1044596", "extension": "py", "fi...
3.71875
stackv2
#!/usr/bin/python3 from string import ascii_lowercase, ascii_uppercase, digits, punctuation from numpy import dtype, fromiter from numpy.random import choice, randint, shuffle CHAR_ENCODING = dtype('U1') INT_TYPE = dtype('uint8') SYMBOLS = ( fromiter(ascii_lowercase, dtype=CHAR_ENCODING), fromiter(ascii_upp...
47
24.34
72
12
293
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ca94cc8558c00a03_f4347a28", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 47 ]
[ null ]
[ 11 ]
[ 30 ]
2024-11-18T19:07:34.506523+00:00
1,616,181,303,000
fc3633d2f13882169bba39084760321f35c82990
3
{ "blob_id": "fc3633d2f13882169bba39084760321f35c82990", "branch_name": "refs/heads/main", "committer_date": 1616181303000, "content_id": "a715627556d0b556740bca76f1076c1611dc9856", "detected_licenses": [ "MIT" ], "directory_id": "4ab7ee6d6a7d42010d8ea51863371d32c1d77b76", "extension": "py", "file...
2.828125
stackv2
""" ---------------------------------- Minas Katsiokalis AM: 2011030054 email: minaskatsiokalis@gmail.com ---------------------------------- """ import socket,ssl,pprint #create a socket, set hostname = local_name, and port s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) host = socket.gethostname...
38
26.63
67
8
257
python
[{"finding_id": "codeql_py/insecure-protocol_d78eceb71d566a6e_53ac06cd", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 23 ]
[ null ]
[ 12 ]
[ 19 ]
2024-11-18T19:07:48.015324+00:00
1,678,114,008,000
7b44be2e0d870b01f29c168ab906685a428a2896
3
{ "blob_id": "7b44be2e0d870b01f29c168ab906685a428a2896", "branch_name": "refs/heads/master", "committer_date": 1678114008000, "content_id": "0b62af9a05c061b027957d866862e8a44571df5d", "detected_licenses": [ "MIT" ], "directory_id": "f52b8606074c2e0cc0c60b30b51c015fd932b0a2", "extension": "py", "fi...
2.703125
stackv2
from collections import OrderedDict import yaml from jinja2 import Environment, PackageLoader from lxml import etree from virl.helpers import get_node_mgmt_ip def setup_yaml(): """ https://stackoverflow.com/a/8661021 """ represent_dict_order = lambda self, data: self.represent_mapping("tag:yaml.org,2002:map",...
263
31.69
118
18
1,942
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d2844e8e8217b349_acb6b089", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 193, 207, 221 ]
[ null, null, null ]
[ 14, 14, 14 ]
[ 74, 74, 74 ]
2024-11-18T19:07:54.099309+00:00
1,584,302,449,000
f0d8ac1a8551b164bcc07f8028111aae0b0ce8d2
3
{ "blob_id": "f0d8ac1a8551b164bcc07f8028111aae0b0ce8d2", "branch_name": "refs/heads/master", "committer_date": 1584302449000, "content_id": "5fd4dcedc518b7516b8ce55ea138001f470c2e98", "detected_licenses": [ "MIT" ], "directory_id": "7f26c264463211695cc857c9927201d0560f3fc5", "extension": "py", "fi...
2.640625
stackv2
from flask import Flask from flask import url_for from flask import json from flask import request from flask import abort import doctors import logging app = Flask(__name__) doc_data = doctors.DoctorData() @app.route('/doctors', methods = ['GET']) def api_doctors(): # Api que devuelve la lista de todos los terap...
45
34.36
125
17
359
python
[{"finding_id": "codeql_py/flask-debug_dfe19086b3179143_762e9150", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-117" ]
[ "py/flask-debug", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1)." ]
[ 45, 34 ]
[ null, null ]
[ 5, 29 ]
[ 24, 41 ]
2024-11-18T19:08:00.084402+00:00
1,468,560,272,000
57a4e5473f40cbd2b1fb17152419e703c496c3b4
3
{ "blob_id": "57a4e5473f40cbd2b1fb17152419e703c496c3b4", "branch_name": "refs/heads/master", "committer_date": 1468560272000, "content_id": "7eab5dd45c9b3b2a70e796c916dc1c8870ffad25", "detected_licenses": [ "MIT" ], "directory_id": "540214282c30d9d53e9deffb837a39e7e736eece", "extension": "py", "fi...
3.21875
stackv2
#!/usr/bin/env python # -*- encoding: utf-8 -*- """ This file contains the code for working with links. """ import re try: from collections.abc import MutableSequence except ImportError: # pragma: no cover from collections import MutableSequence # Regex for matching email addresses. This is taken from bir...
150
32.58
79
20
1,222
python
[{"finding_id": "codeql_py/redos_a4799ef5744f40b0_ffaa9151", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '!'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '!'." ]
[ 48 ]
[ null ]
[ 11 ]
[ 22 ]
2024-11-18T19:18:30.898303+00:00
1,598,576,872,000
f364fd719b85fcc0e1d1cb218d93f7195b6b501e
3
{ "blob_id": "f364fd719b85fcc0e1d1cb218d93f7195b6b501e", "branch_name": "refs/heads/master", "committer_date": 1598576872000, "content_id": "0cb3e22b02b2f655852fb2ce4608d9b114d7aec5", "detected_licenses": [ "MIT" ], "directory_id": "19571a766935df38c76e772cdda024b40d31dc1f", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python3 from optparse import OptionParser import os import os.path as path import requests import shutil import sys import tarfile import urllib.request import zipfile current_version_url = 'https://www.drupal.org/download-latest/tar.gz' home_directory = os.path.dirname(os.path.realpath(__file__)) temp_...
138
32.41
100
18
991
python
[{"finding_id": "codeql_py/tarslip_3ee7cb8c55b24e88_30a16062", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 82 ]
[ null ]
[ 5 ]
[ 12 ]
2024-11-18T19:18:40.724812+00:00
1,516,863,293,000
250e07b722609770e6bf5fdc5856ae5f1c704c8e
5
{ "blob_id": "250e07b722609770e6bf5fdc5856ae5f1c704c8e", "branch_name": "refs/heads/master", "committer_date": 1516863293000, "content_id": "7fd0066f4dc36bddd680a0329109a1ee6e31ea55", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d6bfde18dcf6cac32975438e90beca5216a14f68", "extension": "py"...
4.59375
stackv2
#18 사용자가 연봉과 결혼 여부를 입력하면 다음의 # 세금율에 의해 납부해야 할 세금을 계산하는 프로그램을 작성 salary = int(input('연봉을 입력하세요')) isMarried = input('결혼여부를 입력하세요 (Y/N)') tax=0 if isMarried.upper() == 'N': if salary <3000 : tax = salary * 0.1 else : tax = salary * 0.25 else: if salary : tax= salary*0.1 else : ...
114
21.98
59
11
1,253
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9ad10f613e19ff37_a01195f8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 17, 17 ]
[ null, null ]
[ 17, 24 ]
[ 23, 27 ]
2024-11-18T19:18:50.200542+00:00
1,473,838,865,000
a227dafabbc96834e8bfda49f8b00be6bf95abd5
3
{ "blob_id": "a227dafabbc96834e8bfda49f8b00be6bf95abd5", "branch_name": "refs/heads/master", "committer_date": 1473838865000, "content_id": "9ad0132dd6b30b8fc4703b4a5603b56227c0c26a", "detected_licenses": [ "MIT" ], "directory_id": "e386c3b58815fc01d2ec3ba938e6fe6250638f53", "extension": "py", "fi...
3.140625
stackv2
#! /usr/bin/env python3 -B # # Codice eseguibile per i capitoli del libro # "Fondamenti di Programmazione in Python" di # Fabio Pellacini # # # Released under the MIT license # # Copyright (c) 2016 Fabio Pellacini # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software an...
410
24.89
79
15
3,026
python
[{"finding_id": "codeql_py/reflective-xss_6c5ef3b3f3344e1e_2922658e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
8
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scri...
[ 355, 365, 372, 379, 386, 393, 400, 406 ]
[ null, null, null, null, null, null, null, null ]
[ 12, 12, 12, 12, 12, 12, 12, 12 ]
[ 24, 24, 24, 24, 24, 24, 24, 24 ]
2024-11-18T19:19:03.563908+00:00
1,622,508,915,000
5b6d1ec30f17e2e06c0522195102cba86b0bc5a8
2
{ "blob_id": "5b6d1ec30f17e2e06c0522195102cba86b0bc5a8", "branch_name": "refs/heads/main", "committer_date": 1622508915000, "content_id": "eb236c1aa3f99c5caba7ad04c21292689f2e00ae", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b93fc62f02c43a6a8fceda4b0a1f66febfa35a27", "extension": "py", ...
2.46875
stackv2
from flask import Flask, request, render_template from flask_restful import Resource, Api import shutil from keplergl import KeplerGl import pandas as pd import mysql.connector import sys from conf_rt import config import re import unicodedata import nltk from nltk.stem.porter import * from nltk.corpus import stopword...
143
30.74
114
13
1,197
python
[{"finding_id": "codeql_py/flask-debug_e18329aef76f6325_d66aa392", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 143, 127 ]
[ null, null ]
[ 5, 32 ]
[ 35, 37 ]
2024-11-18T19:19:16.045567+00:00
1,526,659,451,000
bad5a3cc9b073c54e54dbb5c2254be1ff733b8af
2
{ "blob_id": "bad5a3cc9b073c54e54dbb5c2254be1ff733b8af", "branch_name": "refs/heads/master", "committer_date": 1526659451000, "content_id": "36af6774000122e49ac243fbe3d13d349182be27", "detected_licenses": [ "MIT" ], "directory_id": "6542528d3813442cfb19874898590054c48f8c59", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Xray API Module """ import os import re import base64 import logging import json import requests from requests.auth import HTTPBasicAuth from xraypy import xrayutils __author__ = "João Galego" __copyright__ = "João Galego" __license__ = "mit" LOGGER = logging.getLo...
431
33.25
97
17
3,079
python
[{"finding_id": "codeql_py/request-without-cert-validation_08a2593a003cc9cd_94f3dba5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 347, 395 ]
[ 351, 399 ]
[ 20, 20 ]
[ 47, 47 ]
2024-11-18T19:29:42.113890+00:00
1,624,690,133,000
9feeb8eb138a493419152cbbe15708cf2f83f144
3
{ "blob_id": "9feeb8eb138a493419152cbbe15708cf2f83f144", "branch_name": "refs/heads/main", "committer_date": 1624690133000, "content_id": "5c084e63912f18c837d6d27de52eb0468b3312b5", "detected_licenses": [ "MIT" ], "directory_id": "95b7a68bc5106f02343c9741533634eaf8aa4ab7", "extension": "py", "file...
2.578125
stackv2
""" main module which starts the application """ import os import sys import utils import time from json import load, dumps from threading import Thread from argparse import ArgumentParser from flask import Flask, render_template, jsonify, make_response, request from dbUtils import meta, addQuery, getAllQuery, setMoni...
160
28.21
136
20
1,206
python
[{"finding_id": "codeql_py/stack-trace-exposure_0637537203aaefa6_3fe6fe0c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 86, 160 ]
[ null, null ]
[ 33, 2 ]
[ 53, 21 ]
2024-11-18T19:44:23.044277+00:00
1,465,752,458,000
93ad74af013dc562ede14958b4d35a49a773b9eb
2
{ "blob_id": "93ad74af013dc562ede14958b4d35a49a773b9eb", "branch_name": "refs/heads/master", "committer_date": 1465752458000, "content_id": "7b852f55b1ef0341959fc497edb95d819992e801", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6a5144b9aae890b825f0f5070cdc4064b312aaf1", "extension": "py"...
2.359375
stackv2
from flask import Flask, render_template, request import urllib import os from flask import json from rejseplanen import RejseplanClient, convertStops, convertDepartures app = Flask(__name__) baseurl = "http://xmlopen.rejseplanen.dk/bin/rest.exe" rejseplanClient = RejseplanClient(baseurl) apikey = 'AIzaSyCyOJLtB3rOMl...
63
28.51
72
12
506
python
[{"finding_id": "codeql_py/log-injection_8b5190e05beb5ddf_07dc9bd0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 30, 30, 48 ]
[ null, null, null ]
[ 45, 47, 35 ]
[ 46, 48, 44 ]
2024-11-18T19:44:34.765095+00:00
1,469,431,585,000
2aca4f1cd485c5b4d5fb8e5d9c6ab8563f7b494f
3
{ "blob_id": "2aca4f1cd485c5b4d5fb8e5d9c6ab8563f7b494f", "branch_name": "refs/heads/master", "committer_date": 1469431585000, "content_id": "e42bdb233f3c29af559bb3d5cd7382b9caa86dab", "detected_licenses": [ "MIT" ], "directory_id": "2b2502225fc6ff1bc2b5386d29f73c725431b792", "extension": "py", "fi...
2.90625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import logging import socket import paramiko LOG = logging.getLogger(__name__) class SSHConnectException(Exception): pass class PasswordAuthException(Exception): pass def __new_sshclient(): client = paramiko.SSHClient() client.load_system_host_keys(...
113
33.45
89
13
824
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e7549d05dcf45ac0_bd8aaa68", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 23 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-18T19:58:28.692880+00:00
1,481,751,192,000
218167b1ddfbff110cad81d05d80de0090ef6967
2
{ "blob_id": "218167b1ddfbff110cad81d05d80de0090ef6967", "branch_name": "refs/heads/master", "committer_date": 1481751192000, "content_id": "eb345bb99a011b6d4f08f09ad325bef15f982d5c", "detected_licenses": [ "MIT" ], "directory_id": "1a49e02f4f3923349b4434029343e3ef8c50838e", "extension": "py", "fi...
2.359375
stackv2
import logging from flask import Flask, request, abort, jsonify, make_response from flask.ext.sqlalchemy import SQLAlchemy, DeclarativeMeta from json import JSONEncoder from sqlalchemy import * import sys import json import os import inspect from sqlalchemy.dialects.postgresql import INTEGER, REAL, CHAR import psycopg2...
227
34.19
100
22
1,956
python
[{"finding_id": "codeql_py/reflective-xss_9cffcf8e8ea43b93_7bcb64a8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 155 ]
[ null ]
[ 12 ]
[ 29 ]
2024-11-18T20:10:26.992514+00:00
1,630,649,440,000
3250177c914aa84e2732b7803ec4a7fe4b9950a0
4
{ "blob_id": "3250177c914aa84e2732b7803ec4a7fe4b9950a0", "branch_name": "refs/heads/main", "committer_date": 1630649440000, "content_id": "72e06466e059ac37b52110e5cb1c916bec2ed4ea", "detected_licenses": [ "MIT" ], "directory_id": "bfbef414923883abc522dc064feafb730ce3b34c", "extension": "py", "file...
3.8125
stackv2
work_hours = [('Abby',100),('Billy',400),('Cassie',800)] def employee_check(work_hours): current_max = 0 # Set some empty value before the loop employee_of_month = '' for employee,hours in work_hours: if hours > current_max: current_max = hours employee_of_month...
17
27.18
56
10
115
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f82935e37be69677_6d6f77ad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 17 ]
[ null ]
[ 7 ]
[ 33 ]
2024-11-18T20:10:29.134457+00:00
1,634,234,655,000
4db1d02543604f032c312e868629b3bf7d1d63d5
2
{ "blob_id": "4db1d02543604f032c312e868629b3bf7d1d63d5", "branch_name": "refs/heads/main", "committer_date": 1634234655000, "content_id": "4f1e32d7c3834e5a0d70478240280f693e1dd952", "detected_licenses": [ "MIT" ], "directory_id": "48f8f48d6af29545d8dfde03de1dbad524b7034d", "extension": "py", "file...
2.375
stackv2
from flask import Flask, send_file, request, render_template, redirect, url_for from bson.objectid import ObjectId import pymongo import json import image import sys from dotenv import load_dotenv load_dotenv() import os mongolab_uri = os.environ.get("DATABASE_URI") client = pymongo.MongoClient(mongolab_uri, ...
74
25.95
136
13
471
python
[{"finding_id": "codeql_py/flask-debug_4216fb820d5706fa_75481665", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 74, 70 ]
[ null, null ]
[ 5, 22 ]
[ 24, 39 ]
2024-11-18T20:23:10.780969+00:00
1,666,738,911,000
2d4344f309046e5d032ae08d13ed6bec316a3392
2
{ "blob_id": "2d4344f309046e5d032ae08d13ed6bec316a3392", "branch_name": "refs/heads/master", "committer_date": 1666738911000, "content_id": "2475a0cec8b55f2d74a042d4000acfb3f25167e7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a1657a0c5c8f3f8b51b98074293e2f2e9b16e6f4", "extension": "py"...
2.40625
stackv2
import logging import os import sys import yaml import json from flask import request from kubernetes import client import datetime as dt from . import api # The backend will send the first config it will successfully load CONFIGS = [ "/etc/config/spawner_ui_config.yaml", "./kubeflow_jupyter/common/yaml/spawne...
473
28.94
79
18
3,275
python
[{"finding_id": "codeql_py/log-injection_5ab5642c04106e48_c6fd865d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 44 ]
[ 46 ]
[ 21 ]
[ 10 ]
2024-11-18T20:23:17.361042+00:00
1,577,894,513,000
3edd597a31ec748b33f455fc8b879e87a5e03b20
3
{ "blob_id": "3edd597a31ec748b33f455fc8b879e87a5e03b20", "branch_name": "refs/heads/master", "committer_date": 1577894513000, "content_id": "86cb90434e08807caaf67e3f04a3b10ab2a57799", "detected_licenses": [ "MIT" ], "directory_id": "6b7f42ce6fa932f06d016d5966d310a54ce8e925", "extension": "py", "fi...
2.984375
stackv2
from flask import Flask, escape, url_for, request, render_template app = Flask(__name__) # @app.route('/') # def hello_world(): # return 'Hello, World!' @app.route('/user/<username>') def show_user_profile(username): # show the user profile for that user return 'User %s' % escape(username) @app.route(...
88
23.72
75
14
512
python
[{"finding_id": "codeql_py/reflective-xss_5da00782388e927f_06f06a99", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 12 ]
[ 31 ]
2024-11-18T20:49:39.975383+00:00
1,508,363,139,000
09f51a62c722441858e27ab50e391f176a8b8afc
3
{ "blob_id": "09f51a62c722441858e27ab50e391f176a8b8afc", "branch_name": "refs/heads/master", "committer_date": 1508363139000, "content_id": "79a499cb1f829a22917bbefe6fa1c817e668488d", "detected_licenses": [ "MIT" ], "directory_id": "905071b9509f1a4aeb8318f6cfe3bd09e8c4bb59", "extension": "py", "fi...
2.90625
stackv2
"""Copyright 2017, Integrated Device Technologies, Inc. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, pu...
173
32.43
111
18
1,315
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ae715a9c3f38c59c_000f3c42", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 160 ]
[ null ]
[ 27 ]
[ 33 ]
2024-11-18T20:50:08.598606+00:00
1,393,055,343,000
350686d4cf95024565608f19fb84243a08086ddb
2
{ "blob_id": "350686d4cf95024565608f19fb84243a08086ddb", "branch_name": "refs/heads/master", "committer_date": 1393055343000, "content_id": "ba1741da3ebbb377f1c30ecd69659cb0261f4d76", "detected_licenses": [ "MIT" ], "directory_id": "81727133b05822826f734953f353e9e50f633482", "extension": "py", "fi...
2.3125
stackv2
import os import hashlib import requests import json FLICKR_BASE = "http://api.flickr.com/services/rest/" def api(method, **kwargs): kwargs.update({ "method": "flickr.{}".format(method), "format": "json", "nojsoncallback": "1", "api_key": os.environ["FLICKR_KEY"], "auth_tok...
22
28.32
82
14
170
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ba4d65ba86de2d55_dd99e482", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 19 ]
[ null ]
[ 37 ]
[ 70 ]
2024-11-18T20:50:19.049057+00:00
1,415,311,169,000
b5b72a661b5da7ed9af95c4aa80ae1e6804aa534
2
{ "blob_id": "b5b72a661b5da7ed9af95c4aa80ae1e6804aa534", "branch_name": "refs/heads/master", "committer_date": 1415311169000, "content_id": "830e9e6787c14761bfc16bf04b76ba69055e238d", "detected_licenses": [ "MIT" ], "directory_id": "a7a36774e55518a67b27eef3079d98554f08c59a", "extension": "py", "fi...
2.5
stackv2
import os import tempfile import re import bottle import PIL.Image import PIL.ImageDraw import PIL.ImageFont formats = { 'png': { 'format': 'PNG', 'mimetype': 'image/png' }, 'jpg': { 'format': 'JPEG', 'mimetype': 'image/jpeg' }, 'gif': { 'format': 'GIF', ...
133
28.07
171
15
1,246
python
[{"finding_id": "codeql_py/path-injection_491de823dffea3eb_4945c617", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 96 ]
[ null ]
[ 53 ]
[ 65 ]
2024-11-18T20:50:43.127172+00:00
1,617,099,076,000
aaaf48e6e1930b2bff77ff81888cfd633aed31f9
3
{ "blob_id": "aaaf48e6e1930b2bff77ff81888cfd633aed31f9", "branch_name": "refs/heads/main", "committer_date": 1617099076000, "content_id": "1f8b79db25f83f521e5627e47e28f4822b1fa871", "detected_licenses": [ "MIT" ], "directory_id": "12cb7f289d6d81011a03fb7d5c74936a5e301423", "extension": "py", "file...
2.859375
stackv2
"""Routes for the course resource. """ import json from flask import current_app as app from flask import request, redirect, render_template, make_response, jsonify from http import HTTPStatus from datetime import datetime as dt from sqlalchemy import or_, and_, not_ import data from models.database import db from mo...
267
33.3
93
15
1,900
python
[{"finding_id": "codeql_py/stack-trace-exposure_77708910059a186c_83d2d6a2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 172, 230, 264 ]
[ null, null, null ]
[ 38, 38, 38 ]
[ 42, 42, 42 ]
2024-11-18T20:50:57.461258+00:00
1,522,862,610,000
5856009005ff2e71028d7bc7c05d3d6e0bcab520
2
{ "blob_id": "5856009005ff2e71028d7bc7c05d3d6e0bcab520", "branch_name": "refs/heads/master", "committer_date": 1522862610000, "content_id": "ead5f8506b70b6d3404b81fb5d9a44c964cbaabf", "detected_licenses": [ "MIT" ], "directory_id": "2e1f88208e3f80dbd76ef20992908636ca7f362b", "extension": "py", "fi...
2.359375
stackv2
import os import json import db_utils as db import tweepy as tp import flask import uuid import html import urllib from functools import wraps from datetime import datetime import streaming os.chdir(os.path.dirname(os.path.abspath(__file__))) ErrorMessage = { "-1": "不明なエラーが発生しました。", "101": "メモの詳細取得に失敗しました。", ...
283
31.78
135
21
2,471
python
[{"finding_id": "codeql_py/insecure-cookie_59750cb3e30a5f8f_abc9a7a3", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
6
true
[ "CWE-614", "CWE-614", "CWE-312", "CWE-1004", "CWE-1004", "CWE-022" ]
[ "py/insecure-cookie", "py/insecure-cookie", "py/clear-text-storage-sensitive-data", "py/client-exposed-cookie", "py/client-exposed-cookie", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Cookie is added to response without the 'secure' flag being set.", "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.", "Sensitive server cookie is set with...
[ 129, 137, 129, 129, 137, 228 ]
[ null, null, null, null, null, null ]
[ 5, 5, 35, 5, 5, 19 ]
[ 63, 49, 62, 63, 49, 56 ]
2024-11-18T21:13:57.407752+00:00
1,600,055,057,000
5643783b4cf6cfd0834da30717c5237ed9e346e6
2
{ "blob_id": "5643783b4cf6cfd0834da30717c5237ed9e346e6", "branch_name": "refs/heads/master", "committer_date": 1600055057000, "content_id": "5393d02735d24a2839f279f5a3df7174e6309351", "detected_licenses": [ "MIT" ], "directory_id": "29c6c54ab679fb2462e29212c75066e9d1940501", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, Blueprint, request, jsonify, make_response from werkzeug.security import generate_password_hash, check_password_hash from db import db_connect from auth import require_auth_token import datetime import jwt import psycopg2 import sys deposits = Blueprint('deposits', __name__) @ deposits.route...
65
41.43
164
16
645
python
[{"finding_id": "codeql_py/stack-trace-exposure_12ea745f2f3f56f5_41212457", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 27, 43, 65 ]
[ null, null, null ]
[ 16, 16, 16 ]
[ 90, 97, 106 ]
2024-11-18T21:13:59.426093+00:00
1,510,042,834,000
85a971e8189fd6e1d180893d5058d0c6342618af
2
{ "blob_id": "85a971e8189fd6e1d180893d5058d0c6342618af", "branch_name": "refs/heads/master", "committer_date": 1510042834000, "content_id": "fd041b1e2418f0544f4f3e678e593f12f7622f74", "detected_licenses": [ "MIT" ], "directory_id": "d00fd11ed937c7fe5b773e87ece54250bb4c3c0b", "extension": "py", "fi...
2.3125
stackv2
from __init__ import db, models, login_manager, app from flask import redirect, url_for, request, render_template from flask_admin import expose, helpers from flask_admin import Admin, AdminIndexView from flask_admin.contrib.sqla import ModelView from forms import LoginForm, submit_ep_form import helpers as my_helpers ...
161
51.35
145
25
1,702
python
[{"finding_id": "codeql_py/path-injection_364793342b8be893_ff6ae370", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 79 ]
[ null ]
[ 37 ]
[ 51 ]
2024-11-18T21:13:59.841015+00:00
1,626,587,998,000
3a51f873ec92801bb79a43d80902656323d90c9e
2
{ "blob_id": "3a51f873ec92801bb79a43d80902656323d90c9e", "branch_name": "refs/heads/master", "committer_date": 1626587998000, "content_id": "334f86ad943e41933ae0339123870b4c478866f5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "06b35f7427ff8b2130fe3c1a7cfca781890e23ac", "extension": "py"...
2.46875
stackv2
''' Created on 05-Feb-2021 @author: Abhishek Prajapati ''' from os import path from jinja2 import Environment, FileSystemLoader from managers.vars_manager import AppsVars from pyexception.RazorException import RazorException from razorpy_abstract.RazorPy import RazorPy import ntpath class Template(RazorPy): ''...
94
27.73
140
20
552
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f73fcbf817babf60_757f2c9d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 71, 88 ]
[ null, null ]
[ 19, 19 ]
[ 50, 50 ]
2024-11-18T21:14:01.686406+00:00
1,611,104,375,000
2efce0458f87a1706f4f1d0904ab5521666b1428
2
{ "blob_id": "2efce0458f87a1706f4f1d0904ab5521666b1428", "branch_name": "refs/heads/master", "committer_date": 1611104375000, "content_id": "6f2f7222a7fe88435b9e0441c375bef5b3ca01e5", "detected_licenses": [ "MIT" ], "directory_id": "1e94439a8db204d703cfeaae3ab69aa005ea059d", "extension": "py", "fi...
2.4375
stackv2
import uuid from tornado.websocket import WebSocketHandler, WebSocketClosedError import logging import json logger = logging.getLogger(__name__) class FarCameraFeedWS(WebSocketHandler): """ watchers is a class level array, anyone connecting shares the same array """ watchers = set() def open(self):...
44
30.02
76
15
279
python
[{"finding_id": "codeql_py/log-injection_a9d3248452c9abae_b10d3f1d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 25 ]
[ 32 ]
2024-11-18T21:14:08.560027+00:00
1,625,038,382,000
e6fccf83e9e4f1c008f9b8f8de1a39bb88afe08b
3
{ "blob_id": "e6fccf83e9e4f1c008f9b8f8de1a39bb88afe08b", "branch_name": "refs/heads/main", "committer_date": 1625038426000, "content_id": "62ebf3ba8f42b8ca3df2406119dd393d33c6c682", "detected_licenses": [ "MIT" ], "directory_id": "f723d0e2d3e4557578dbfc2f6d625e736a2c13df", "extension": "py", "file...
3.390625
stackv2
"""Обнаружение структуры во входном файле""" import re NAME_STR = 'Name *= *[A-Za-z0-9_,\(\)\+]+\n' VALUES_STR = 'Values *= *\[(\S+, *)*\S+\]\n' VALUE = '[^\s,]+' FUNCTION = '[A-Za-z0-9_]+ *\\{[^\\}]+\\}' SENTENCE_STR = '[^\n]+=[^;]+' class ParsingException(ValueError): """Вызывается, когда во входном файле нах...
80
33.39
121
29
690
python
[{"finding_id": "codeql_py/redos_a5fd5a51a7c12399_b42e7223", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'Values=\\[' and containing many r...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'Values=\\[' and containing many repetitions of '!,'." ]
[ 6 ]
[ null ]
[ 29 ]
[ 32 ]
2024-11-18T21:14:10.591597+00:00
1,661,133,207,000
2c3c8c878631bde9469d9dcf8c4494cf2d3c9a8e
2
{ "blob_id": "2c3c8c878631bde9469d9dcf8c4494cf2d3c9a8e", "branch_name": "refs/heads/master", "committer_date": 1661133207000, "content_id": "8f1241f24eac2f7c94e0b40ff9e875a112d60c6e", "detected_licenses": [ "MIT" ], "directory_id": "4f81b519e5d48106cdcdb099e5660c21911b1287", "extension": "py", "fi...
2.375
stackv2
import requests import datetime import threading import json import os import pandas as pd import numpy as np import time import sqlite3 from configparser import ConfigParser from requests.packages.urllib3.exceptions import InsecureRequestWarning from requests_toolbelt.multipart.encoder import MultipartEncoder from con...
160
29.37
115
24
1,448
python
[{"finding_id": "codeql_py/request-without-cert-validation_1116672ea2fe77d2_4a6dc7a3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 66 ]
[ 71 ]
[ 14 ]
[ 5 ]
2024-11-18T21:14:16.686179+00:00
1,518,133,705,000
07cef49054bd8ced69ad6cd19e73f4d5990fc68b
3
{ "blob_id": "07cef49054bd8ced69ad6cd19e73f4d5990fc68b", "branch_name": "refs/heads/master", "committer_date": 1518133705000, "content_id": "24f673225af43b708244412033de0c6ad92c58a5", "detected_licenses": [ "MIT" ], "directory_id": "2b52723838481e3ef6f8ba20326487dc4086e93b", "extension": "py", "fi...
3.078125
stackv2
from flask import Flask, request, redirect, render_template import cgi import os #boilerplate language to call templates app = Flask(__name__) app.config['DEBUG'] = True @app.route("/") def index(): return render_template('hello_form.html') @app.route("/hello", methods=["POST"]) def hello(): first_n...
97
25.85
105
13
589
python
[{"finding_id": "codeql_py/reflective-xss_e697c3f855fb2468_aa281bc1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 81 ]
[ null ]
[ 12 ]
[ 90 ]
2024-11-18T21:14:22.565228+00:00
1,600,906,792,000
4b0de28f77fa82b04e4ef36319723a79cc355d9a
3
{ "blob_id": "4b0de28f77fa82b04e4ef36319723a79cc355d9a", "branch_name": "refs/heads/master", "committer_date": 1600906792000, "content_id": "14bd146ac38ab234e05bfde91ec99cbeec3200e3", "detected_licenses": [ "MIT" ], "directory_id": "953c95de4b730ee28227117da5aee49fcac56af2", "extension": "py", "fi...
3.1875
stackv2
print("Welcome to Startin Dev Web Campus!\n\nPlease sign up\n") username1 = input("Enter your dumb username: ") email1 = input("Enter your childish email: ") password1 = input("Enter your easy hackable password: ") print("\nSuccessfully registration\nNow please login for God´s sake\n") usernameOrEmail = input("Pleas...
28
37.5
110
13
256
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_66fef7a6d42457d6_dd40ccb8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 13, 19 ]
[ null, null ]
[ 11, 11 ]
[ 19, 19 ]
2024-11-18T21:14:26.856168+00:00
1,654,261,519,000
5844d95660beb7890b1683a0c6d417963fbd75fc
3
{ "blob_id": "5844d95660beb7890b1683a0c6d417963fbd75fc", "branch_name": "refs/heads/master", "committer_date": 1654261519000, "content_id": "908dc5ce981e7fbf3a53cf12af9b275a3c36d404", "detected_licenses": [ "MIT" ], "directory_id": "bee20f811ff64b58f6810bb100147bc4aea9b5a2", "extension": "py", "fi...
2.984375
stackv2
import os import csv import chardet from random import SystemRandom from string import ascii_uppercase, digits from django.conf import settings from django.contrib.auth import get_user_model from django.db import IntegrityError from django.core.management.base import BaseCommand, CommandError from system.models import ...
198
29.64
79
26
1,203
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c7fdcb273c9ff508_126c1554", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 51 ]
[ null ]
[ 20 ]
[ 63 ]
2024-11-18T20:48:04.972335+00:00
1,591,205,268,000
f75b0d2801155825d0251098fca7ea532495bb38
3
{ "blob_id": "f75b0d2801155825d0251098fca7ea532495bb38", "branch_name": "refs/heads/master", "committer_date": 1591205268000, "content_id": "c0faf3c4cdae1cf010d6dfee08970342c681fc45", "detected_licenses": [ "MIT" ], "directory_id": "63e45564812432d93f4d6acf02f85ef25183b2ad", "extension": "py", "fi...
2.78125
stackv2
import pandas as pd from pandas import DataFrame # from arcgis.gis import GIS # from arcgis import geocoding import googlemaps import ssl import os def arcgis_geocode(df: DataFrame, arcgis_user: str, arcgis_pass: str): ssl._create_default_https_context = ssl._create_unverified_context arcgis_user = arcgis_user...
80
35.25
97
15
789
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3bebd92ee0ea7a1e_3621a23e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 70 ]
[ null ]
[ 11 ]
[ 25 ]
2024-11-18T20:48:10.997189+00:00
1,691,687,076,000
b986ee273959d95e9833121913d3496fa575061a
3
{ "blob_id": "b986ee273959d95e9833121913d3496fa575061a", "branch_name": "refs/heads/master", "committer_date": 1691687076000, "content_id": "37745c776370039f43594e28c519572ae0865e3f", "detected_licenses": [ "MIT" ], "directory_id": "98d9a43778d2d0eebe3820ab3dfd0ceb488e204d", "extension": "py", "fi...
2.625
stackv2
import os from typing import Set, Tuple, Union import requests from dxf import DXF from dockerscan import DockerscanNotExitsError, DockerscanError def _get_digest_by_tag(registry: str, remote_image_name: str, tag: str) -> str: insecure, registry_without_schema = _ge...
145
29.07
87
13
924
python
[{"finding_id": "codeql_py/request-without-cert-validation_ac75528339d98d56_1664893a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 42 ]
[ 45 ]
[ 9 ]
[ 35 ]
2024-11-18T20:48:20.280346+00:00
1,543,565,808,000
85137c8e773380d2a75a9481f083d80d4ec20f8f
2
{ "blob_id": "85137c8e773380d2a75a9481f083d80d4ec20f8f", "branch_name": "refs/heads/master", "committer_date": 1543565808000, "content_id": "ec47c5217dd36a72c386eeac8febe5c1fe4e4053", "detected_licenses": [ "MIT" ], "directory_id": "9584db019d5555ab386c921032eadfc74eb461e3", "extension": "py", "fi...
2.34375
stackv2
#!usr//bin/env python3 import json import hashlib from suds.client import Client from xml.sax.saxutils import escape def gettext(username, password): url = 'http://114.55.172.147:9701/MemberService.asmx?wsdl' client = Client(url) m = hashlib.md5(password.encode('utf-8')) pswd = m.hexdigest() print...
28
19.89
82
11
175
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_992a475ccea72041_75688d47", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 11 ]
[ null ]
[ 21 ]
[ 45 ]
2024-11-18T21:11:32.813140+00:00
1,626,748,235,000
0c88187c4601a91cf8216145d6208fcb5bd2d224
2
{ "blob_id": "0c88187c4601a91cf8216145d6208fcb5bd2d224", "branch_name": "refs/heads/main", "committer_date": 1626748235000, "content_id": "d84897b0fa7137919b0f229ec20161d1a80a3576", "detected_licenses": [ "MIT" ], "directory_id": "b10f92bf58b91f856b8d85c36b6d37d971c9422a", "extension": "py", "file...
2.390625
stackv2
from __future__ import annotations from email import message import os import logging from typing import Optional from datetime import datetime, timedelta from fastapi import FastAPI from fastapi.responses import PlainTextResponse from pydantic import BaseModel from enum import Enum, IntEnum from trident_mcc.models ...
99
28.34
87
15
660
python
[{"finding_id": "codeql_py/log-injection_71be71a6b8ab17f7_d58ca6a8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 79 ]
[ null ]
[ 9 ]
[ 82 ]
2024-11-18T21:11:40.341824+00:00
1,509,611,786,000
57e01bff6d75c83196cf230be1f6947ca500cb13
2
{ "blob_id": "57e01bff6d75c83196cf230be1f6947ca500cb13", "branch_name": "refs/heads/master", "committer_date": 1509611786000, "content_id": "69d3aa41f9539a641ccc9799d00929070a280db1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ec17eada02ee0254560f22b3fc3a75cb35dbb1c7", "extension": "py"...
2.390625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- ''' #################################### # # Ingestion API Front-end # #################################### We provide: |---------------------------------------|-----------------|----------------| | endpoint | accepted method | Note ...
170
35.02
105
15
1,379
python
[{"finding_id": "codeql_py/log-injection_58cf89f6968c13aa_00d8b56a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 68, 83 ]
[ null, null ]
[ 14, 14 ]
[ 51, 49 ]