added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T19:49:10.060789+00:00 | 1,507,821,688,000 | dfc0c07643d2349182975ccc9d5e1db3b4914e97 | 3 | {
"blob_id": "dfc0c07643d2349182975ccc9d5e1db3b4914e97",
"branch_name": "refs/heads/master",
"committer_date": 1507821688000,
"content_id": "dcfd25f5a282a11779a00f4a226e13402ba047a0",
"detected_licenses": [
"MIT"
],
"directory_id": "04f6691ec49be9abd1dffe60aefdb2e39aadab2f",
"extension": "py",
"fi... | 2.859375 | stackv2 | """ Defining the MNSIT dataset"""
from __future__ import absolute_import
import _pickle as cPickle
import os
import sys
import tarfile
import urllib.request
import numpy as np
import tensorflow as tf
from ttools.core.datasets import Dataset
from ttools.utils.utils import image_to_tfexample
class Cifar10(Dataset):
... | 142 | 37.99 | 110 | 20 | 1,207 | python | [{"finding_id": "codeql_py/tarslip_7aa7df7742be6fb3_4e92ead1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
43
] | [
null
] | [
13
] | [
43
] | |
2024-11-18T19:49:13.642051+00:00 | 1,596,457,425,000 | b35c0247a8772eb4c0872120aa7de47e51e06e3f | 3 | {
"blob_id": "b35c0247a8772eb4c0872120aa7de47e51e06e3f",
"branch_name": "refs/heads/master",
"committer_date": 1596457425000,
"content_id": "cad2a614b800db00742f4fdfd9bcb7cf55896b22",
"detected_licenses": [
"MIT"
],
"directory_id": "d5a316406ae2494ea82d7f012b96a956eb6f7131",
"extension": "py",
"fi... | 3.09375 | stackv2 | '''
@author: Reem Alatrash
@version: 1.0
=======================
This module has helper functions that are meant to be used by several scripts
'''
'''
******* ********* *********
******* imports *********
******* ********* *********
'''
import os
import codecs
'''
******* ********* *********
******* functions **... | 122 | 28.96 | 126 | 15 | 790 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_48d0760270e48bb2_218fc0aa", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
57
] | [
null
] | [
31
] | [
45
] | |
2024-11-18T20:10:52.914921+00:00 | 1,531,579,049,000 | 8f658145bfdc6381c7f768995a2e13dd23b1c6d6 | 3 | {
"blob_id": "8f658145bfdc6381c7f768995a2e13dd23b1c6d6",
"branch_name": "refs/heads/master",
"committer_date": 1531579049000,
"content_id": "08f548377ce5efc63b63afb9f3461acddc1a5387",
"detected_licenses": [
"Unlicense"
],
"directory_id": "f65b5f0af5270dfcd4775fafa0ebf55bf6bb11e4",
"extension": "py",... | 2.828125 | stackv2 | #!/usr/bin/python
import argparse
import os
import pathlib
import shlex
import subprocess
import typing
PREFIX = b'QR-Code:WIFI:'
class Wifi(typing.NamedTuple):
ssid: str
security: str
password: str = ''
hidden: bool = False
def main():
config = parse_args()
if not config.interface:
... | 148 | 30.86 | 113 | 19 | 1,033 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_dde09d23061e85cc_80be6ed0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
115,
118
] | [
null,
null
] | [
21,
15
] | [
28,
51
] | |
2024-11-18T20:11:09.213762+00:00 | 1,568,452,095,000 | f0030c965eede9dc8cdd5156b69d3c7ff1fd4955 | 2 | {
"blob_id": "f0030c965eede9dc8cdd5156b69d3c7ff1fd4955",
"branch_name": "refs/heads/master",
"committer_date": 1568452095000,
"content_id": "90d6537427abfc2033cd5fe43ed41f76da3958ba",
"detected_licenses": [
"ISC"
],
"directory_id": "3d39a53d1d909e3455197376e1e195014a8d4b27",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
import boto3
import argparse
import logging
logging.basicConfig(level=logging.INFO)
logger = logging.getLogger(__name__)
parser = argparse.ArgumentParser()
required_named = parser.add_argument_group('required named arguments')
required_named.add_argument('--stack-name', help='name of stack to b... | 50 | 38.96 | 111 | 17 | 436 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a0fdca4e15263cbd_f72a4828", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
35
] | [
null
] | [
29
] | [
87
] | |
2024-11-18T20:26:04.449615+00:00 | 1,464,055,740,000 | 814f079fb5ad17bfcaacdfb2fbc78233a643d992 | 3 | {
"blob_id": "814f079fb5ad17bfcaacdfb2fbc78233a643d992",
"branch_name": "refs/heads/master",
"committer_date": 1464055740000,
"content_id": "034f570f7778ad8b0de2da6eff58f1ece9419a7f",
"detected_licenses": [
"MIT"
],
"directory_id": "9093a621f65cb56931f5fb6cde22ef08dac62f83",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/python
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
from os import curdir, sep
import os
import cgi
import json
PORT = 8080
class Handler(BaseHTTPRequestHandler):
def formatPath(self, p):
if p.startswith('/dist') or p.startswith('/lib'):
return '../..' + p;
... | 106 | 30.82 | 100 | 21 | 671 | python | [{"finding_id": "codeql_py/path-injection_287d8eda29fa495f_806b71e1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
48,
50,
75
] | [
null,
null,
null
] | [
39,
26,
27
] | [
47,
34,
78
] | |
2024-11-18T20:26:27.850591+00:00 | 1,619,084,788,000 | cef14f092582e0bfa65a4fd58f9d29ec5fca5a99 | 3 | {
"blob_id": "cef14f092582e0bfa65a4fd58f9d29ec5fca5a99",
"branch_name": "refs/heads/main",
"committer_date": 1619084788000,
"content_id": "44a8c16012d3d2f6cca7782b126d7e13496b90a1",
"detected_licenses": [
"MIT"
],
"directory_id": "b62919609acdb9dad3f09e862f59e55319c44ee2",
"extension": "py",
"file... | 2.734375 | stackv2 | import dbconnector.dbconnector as dbcon
from openpyxl import load_workbook
import sys
import re
class ExcelLoader():
user_list = []
drone_list = []
excluded_headder=["Map","Track","Race","Level",None]
user_id = {}
drone_id = {}
def __init__(self, db):
self.db = db
for user in db.get_users():
self.user... | 139 | 23.63 | 107 | 25 | 998 | python | [{"finding_id": "codeql_py/overly-large-range_e5ec6abac6ca5c9f_5d267d2b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
106,
116
] | [
null,
null
] | [
28,
28
] | [
31,
31
] | |
2024-11-18T20:26:39.422714+00:00 | 1,605,559,776,000 | 86538f151f70fb2f0889b35030141afd9ffddb21 | 3 | {
"blob_id": "86538f151f70fb2f0889b35030141afd9ffddb21",
"branch_name": "refs/heads/main",
"committer_date": 1605559776000,
"content_id": "a2442a7e3b3ea959a13a3af660aa45f9c01af917",
"detected_licenses": [
"MIT"
],
"directory_id": "d0cfb49e6c2b8a30a905ccd86eed7da1fe164a9f",
"extension": "py",
"file... | 3.234375 | stackv2 | import requests
import validators
import pprint
import re
from logzero import logger
from urllib.parse import urljoin
from bs4 import BeautifulSoup
pp = pprint.PrettyPrinter(indent=4)
root_url = 'https://www.nyrr.org' # This should be the hostname / root URL as we will be appending to it later.
rule = re.compile(r"^[\... | 83 | 36.3 | 123 | 14 | 744 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_b77ca875fbb8ff69_441a4ce1", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'nyrr.org', so it might match more hosts than expected."
] | [
10
] | [
null
] | [
13
] | [
33
] | |
2024-11-18T20:26:43.613369+00:00 | 1,536,559,756,000 | d0d9c019b05118c9b3cb8d22570f00fd98321103 | 2 | {
"blob_id": "d0d9c019b05118c9b3cb8d22570f00fd98321103",
"branch_name": "refs/heads/master",
"committer_date": 1536559756000,
"content_id": "d11eaef77ab2cce9386f7e90374b80fed705717c",
"detected_licenses": [
"MIT"
],
"directory_id": "ca8dc4d5b6168648cf8a842fc27191fec3597a09",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
import sys
import time
import hashlib
import requests
import json
from queue import Queue, Empty
from multiprocessing.dummy import Pool
from threading import Thread
# 此处为APIID SECRET
apiid = ' '
secret = ' '
# 此处为API请求地址及参数
REST_HOST = "http://api.coinbene.com"
market_url = "http://api.coinb... | 255 | 26.57 | 101 | 16 | 1,728 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_25b9ccedc1c446b5_21e5bd75", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
139
] | [
null
] | [
18
] | [
26
] | |
2024-11-18T20:27:06.034871+00:00 | 1,630,512,906,000 | 18f5d56a4152941c64e7952e5355aeb41b42de1f | 3 | {
"blob_id": "18f5d56a4152941c64e7952e5355aeb41b42de1f",
"branch_name": "refs/heads/master",
"committer_date": 1630512906000,
"content_id": "70ed75dbb4ea1cc582802491bdb5c48954768835",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "39de0918eec8cea8568a8e7caaf261c9b4b30be4",
"extension": "p... | 2.9375 | stackv2 | """ This example demonstrates showing some basic details about your lists
Below you can see examples of pagination as well as partial response
"""
import requests
import json
try:
import urlparse
except ImportError:
from urllib import parse as urlparse
from config import MailChimpConfig
config = MailChimpCon... | 54 | 26.7 | 73 | 13 | 342 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a691619eff5063d4_e9ada486", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
27
] | [
28
] | [
16
] | [
57
] | |
2024-11-18T20:52:05.974475+00:00 | 1,406,546,062,000 | d74cf405005ab2f92612d6354ae7a334097717d4 | 3 | {
"blob_id": "d74cf405005ab2f92612d6354ae7a334097717d4",
"branch_name": "refs/heads/master",
"committer_date": 1406546062000,
"content_id": "08a854a67ebf382f290e724e34f45ff1859c4304",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "20d20c1da3ec86389fc06d83990b88d99245e184",
"extension": "py"... | 2.625 | stackv2 | import tornado.ioloop
import tornado.web
import tornado.httpserver
from tornado.options import define, options
from PIL import Image
import os
from conf import *
define('port', default=9999, help="run on port 9999", type=int)
def get_blank():
"""
return blank image in case:
1. image doesn't exist
2. ... | 256 | 29.53 | 96 | 17 | 1,796 | python | [{"finding_id": "codeql_py/path-injection_e0c0c61f0f2d7ae5_b12de8b0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 6 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](... | [
49,
51,
62,
63,
182,
222
] | [
null,
null,
null,
null,
null,
null
] | [
29,
31,
30,
30,
62,
22
] | [
33,
52,
34,
52,
66,
26
] | |
2024-11-18T20:52:27.049498+00:00 | 1,626,706,364,000 | f3bf04d253dfd30e133fba78845ea747fa2be6ea | 4 | {
"blob_id": "f3bf04d253dfd30e133fba78845ea747fa2be6ea",
"branch_name": "refs/heads/main",
"committer_date": 1626706364000,
"content_id": "7584f243798b7295c2515f549c256165e715ef54",
"detected_licenses": [
"MIT"
],
"directory_id": "ac842c87aa6958f70f00c55b03e8cd8f5d9c0f50",
"extension": "py",
"file... | 3.71875 | stackv2 | #Classe de cores
class bcolors:
OK = '\033[92m' #GREEN
WARNING = '\033[93m' #YELLOW
FAIL = '\033[91m' #RED
RESET = '\033[0m' #RESET COLOR
AZUL = '\033[1;34m '
user = "andre"
password = "1234"
CPF = ["xxx.xxx.xxx-xx"]
#Inicio do Programa
en = ("N")
while en == ("N") and en!=("S"):
print(f'''{bcolo... | 80 | 27.74 | 67 | 15 | 677 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_697eeb0d0b032dab_eefba160", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
56
] | [
65
] | [
14
] | [
37
] | |
2024-11-18T20:52:27.174590+00:00 | 1,583,134,455,000 | 61a243f35c0c8e3b3430eca0ddb99d53a8003fb8 | 2 | {
"blob_id": "61a243f35c0c8e3b3430eca0ddb99d53a8003fb8",
"branch_name": "refs/heads/master",
"committer_date": 1583134455000,
"content_id": "def9cf0eb838135d3fbfee6ccc862d818f2ae528",
"detected_licenses": [
"Unlicense"
],
"directory_id": "74272324b51a7faa628db7a25c89b8907478d8b7",
"extension": "py",... | 2.46875 | stackv2 | from kivy.logger import Logger
import os
import paramiko
import vyattaconfparser
import json
class Router(object):
def __init__(self, config, resp_q):
self.commands = {
'connect': self.connect,
'disconnect': self.disconnect,
'drop_kids_packets': self.drop_kids_packets,
... | 217 | 41.12 | 101 | 21 | 1,889 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_82e4a92dc20da7ee_983c1846", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
45
] | [
null
] | [
17
] | [
82
] | |
2024-11-18T19:14:26.846393+00:00 | 1,541,794,862,000 | 86c821656f1a404f4c031e9fb8857d5837b1eb6e | 2 | {
"blob_id": "86c821656f1a404f4c031e9fb8857d5837b1eb6e",
"branch_name": "refs/heads/master",
"committer_date": 1541794862000,
"content_id": "cf55ff3051e5754721e086407968e956d1693546",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a8a227f4d1559d07ea572a31e662b30a635e07ed",
"extension": "py"... | 2.328125 | stackv2 | import subprocess
import argparse
import datetime
import time
import os
class OSBuild(object):
def __init__(self, build_version):
self._build_version = build_version
self._datetime = datetime.datetime.now()
self._pubdate = datetime.datetime.now().strftime("%m-%d-%Y")
self._dt = s... | 101 | 35.05 | 80 | 18 | 902 | python | [{"finding_id": "codeql_py/overly-permissive-file_abf4db0697aecb7c_cc85408f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
50
] | [
null
] | [
9
] | [
38
] | |
2024-11-18T19:14:42.514615+00:00 | 1,551,305,297,000 | 752aeb596e644cf120664a4dfd9ae2be6fdff56d | 3 | {
"blob_id": "752aeb596e644cf120664a4dfd9ae2be6fdff56d",
"branch_name": "refs/heads/master",
"committer_date": 1553013509000,
"content_id": "77ebe653cea676a52c2dac4505b168265fbfc819",
"detected_licenses": [
"MIT"
],
"directory_id": "4246a87203fcc3fe807268811f09ea6710442ed0",
"extension": "py",
"fi... | 2.703125 | stackv2 | # Copyright (c) 2019 AT&T Intellectual Property. All rights reserved.
from functools import wraps
from http import HTTPStatus
import flask
import requests
import json
class Aaf(object):
"""
Represents the AAF home server
"""
def __init__(self, service_user, service_password, service_realm, root_uri='h... | 145 | 34.63 | 119 | 15 | 1,074 | python | [{"finding_id": "codeql_py/partial-ssrf_e7b02ead448837b8_41200803", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 3 | true | [
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
77,
100,
124
] | [
82,
105,
129
] | [
16,
16,
16
] | [
14,
14,
14
] | |
2024-11-18T19:27:34.965573+00:00 | 1,403,664,475,000 | 8e17c1c433954089ec2cbd897bbddb2fba2719aa | 3 | {
"blob_id": "8e17c1c433954089ec2cbd897bbddb2fba2719aa",
"branch_name": "refs/heads/master",
"committer_date": 1403664475000,
"content_id": "896ed638d8207679f1443fa28460560c76560936",
"detected_licenses": [
"MIT"
],
"directory_id": "734738c4dd12632f521c9951571011de0e06c842",
"extension": "py",
"fi... | 2.65625 | stackv2 | import time
import logging
from base import Base as Uploader
log = logging.getLogger(__name__)
class SFtpUploader(Uploader):
'''
SFTP Upload handler, see parent class for more info
'''
default_port = 22
connect_attempt_count = 0
upload_attempt_count = 0
sftp = None
ssh_client = None
... | 127 | 35.46 | 107 | 17 | 954 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5fa8402627b0cbb5_7d5db891", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
30
] | [
null
] | [
9
] | [
78
] | |
2024-11-18T19:27:43.301842+00:00 | 1,606,042,988,000 | 360188aafd4522191e35eeb034e8fdea12e03415 | 2 | {
"blob_id": "360188aafd4522191e35eeb034e8fdea12e03415",
"branch_name": "refs/heads/main",
"committer_date": 1606042988000,
"content_id": "37c668478a987a8052e8d83dedbc517e2580c3fb",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c21ac2a5cf095b69d34a20b70be54bee79f0495c",
"extension": "py"... | 2.375 | stackv2 | import requests
import os
import json
from urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
ports = os.environ.get('PORTS')
urls = ['https://{0}'.format(os.environ.get('DOMAIN'))]
try:
ports = ports.strip(' ').split(',')
for port in po... | 120 | 25.82 | 136 | 23 | 725 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ec40c30381c9ebb0_eb6866ee", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
96
] | [
null
] | [
28
] | [
98
] | |
2024-11-18T19:38:56.647149+00:00 | 1,418,711,129,000 | d7a12b54e3c67039d0c7bfd4e67d7c983ff80b5a | 2 | {
"blob_id": "d7a12b54e3c67039d0c7bfd4e67d7c983ff80b5a",
"branch_name": "refs/heads/master",
"committer_date": 1418711129000,
"content_id": "8262f26397ff0e9298d1f5949f25cbb25241316d",
"detected_licenses": [
"MIT"
],
"directory_id": "bb2b4807a7f26e3621c471508f2aaa9a5c7ec22d",
"extension": "py",
"fi... | 2.328125 | stackv2 | from __future__ import print_function
import sys
import yaml
import pprint
from jinja2 import Environment, FileSystemLoader
if __name__ == '__main__':
import argparse
parser = argparse.ArgumentParser()
parser.add_argument('infile',
nargs='?',
type=argparse.FileType('r'),
defaul... | 31 | 22.13 | 66 | 12 | 155 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_50b576845dbbf8f9_dfa966de", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
28
] | [
null
] | [
11
] | [
60
] | |
2024-11-18T20:06:15.076307+00:00 | 1,470,367,343,000 | 8aec87b61fdbffedb34355409d87d998cf3fc411 | 2 | {
"blob_id": "8aec87b61fdbffedb34355409d87d998cf3fc411",
"branch_name": "refs/heads/master",
"committer_date": 1470367343000,
"content_id": "b5da6789a816be1365f3720ad15303adc2f01632",
"detected_licenses": [
"MIT"
],
"directory_id": "8be24cee32380102b3ebf90a55db9bff2e632000",
"extension": "py",
"fi... | 2.375 | stackv2 | # encoding: UTF-8
import hashlib
import zlib
import json
from time import sleep
from threading import Thread
import websocket
# OKCOIN网站
OKCOIN_CNY = 'wss://real.okcoin.cn:10440/websocket/okcoinapi'
OKCOIN_USD = 'wss://real.okcoin.com:10440/websocket/okcoinapi'
# 账户货币代码
CURRENCY_CNY = 'cny'
CURRENCY_USD = 'usd... | 382 | 31.61 | 99 | 16 | 2,603 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3d3a6530f56a3744_cfcf84ce", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
121
] | [
null
] | [
28
] | [
48
] | |
2024-11-18T20:06:26.202214+00:00 | 1,490,196,280,000 | c3ab06849485444da87c8b17a8ba79a5fc71bec4 | 3 | {
"blob_id": "c3ab06849485444da87c8b17a8ba79a5fc71bec4",
"branch_name": "refs/heads/master",
"committer_date": 1490196280000,
"content_id": "eb8e0a3a09baec5377c22ad5904aa4299308fe85",
"detected_licenses": [
"MIT"
],
"directory_id": "bab0cf575d1734cf6c50593bc8e26288b7f4316d",
"extension": "py",
"fi... | 2.859375 | stackv2 | import json
from string import capwords
import sys
from http.server import HTTPServer, BaseHTTPRequestHandler
import ssl
import urllib.request
class MyHTTPRequestHandler(BaseHTTPRequestHandler):
def __tabulate_results(self, json_obj):
col_width = len(max(json_obj, key=len))
table = ''
fo... | 88 | 27.32 | 78 | 19 | 570 | python | [{"finding_id": "codeql_py/partial-ssrf_10306b81776fa502_f89cc0c7", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
29
] | [
32
] | [
16
] | [
10
] | |
2024-11-18T20:06:26.478729+00:00 | 1,502,872,283,000 | e7c72ac45bdd966b492ed78b25d56bace7a814b9 | 3 | {
"blob_id": "e7c72ac45bdd966b492ed78b25d56bace7a814b9",
"branch_name": "refs/heads/master",
"committer_date": 1502872283000,
"content_id": "54ad8aa4c23d6927e745d790bc0f3af9fb104490",
"detected_licenses": [
"ISC"
],
"directory_id": "5e7226af7d9921402b4e642bdac4a04e417363c5",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python
# Scroll
# Developed by acidvegas in Python
# https://github.com/acidvegas/scroll
# irc.py
import glob
import os
import random
import socket
import ssl
import threading
import time
import config
import database
import debug
import functions
# Globals
ascii_dir = os.path.join('data', 'ascii')
#... | 344 | 31.72 | 121 | 34 | 3,006 | python | [{"finding_id": "codeql_py/insecure-protocol_d34e982df1d158ce_5285434f", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
94
] | [
null
] | [
16
] | [
19
] | |
2024-11-18T20:06:30.302689+00:00 | 1,563,016,594,000 | d14f7da9f2c5b03306d4d0234b38ba5dfbeb1e40 | 2 | {
"blob_id": "d14f7da9f2c5b03306d4d0234b38ba5dfbeb1e40",
"branch_name": "refs/heads/master",
"committer_date": 1563016594000,
"content_id": "d7e93a8b6d25ab9dadb139747dddc3784799c7ba",
"detected_licenses": [
"MIT"
],
"directory_id": "6c24823b142bc519bdf5421ac701d9ad17955b12",
"extension": "py",
"fi... | 2.390625 | stackv2 | import re
import logging
import smtplib
from . import passport_blu
from email.mime.text import MIMEText
from email.header import Header
from flask import request, session
from flask import current_app, jsonify
from flask import make_response
from info import redis_store, db
from info.utils.captcha.captcha import captch... | 251 | 24.43 | 109 | 15 | 1,661 | python | [{"finding_id": "codeql_py/polynomial-redos_adfb96071320d2f7_86ab52a2", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '0' and with many repetitions of '0'."
] | [
70
] | [
null
] | [
103
] | [
108
] | |
2024-11-18T20:18:36.807551+00:00 | 1,627,177,940,000 | 52bda2b9373885ffdba68c26064ee4d6560a9784 | 4 | {
"blob_id": "52bda2b9373885ffdba68c26064ee4d6560a9784",
"branch_name": "refs/heads/main",
"committer_date": 1627177940000,
"content_id": "8bb0f894fe6010279caff030909b511f10413516",
"detected_licenses": [
"MIT"
],
"directory_id": "1fc895c372e504a6ac396f28f3358f7e6e623a6a",
"extension": "py",
"file... | 3.65625 | stackv2 | #!/usr/bin/python // 파이썬을 위한 파일임을 선언
# -*- coding: utf8 -*- // 인코딩 방식 지정 => 한글 주석으로 인한 실행 에러 방지
# 반복문 : for : 반복 횟수 예측 가능
# while : 반복 횟수 예측 불가능
# for : 사전에 또는 특정 상황에 맞춰서 미리 반복횟수 설정
# while : 특정 조건에 도달할 때까지 반복한다.
# 사용법
# 초기값 ---> while 반복문에서 빠져나오기 위해 사용되는 변수
# while (조건문) : ---> 결과 : T / F
# 코드블... | 135 | 18.5 | 58 | 12 | 1,147 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_caa8b330691c2cf5_27624c22", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]... | [
132
] | [
null
] | [
11
] | [
18
] | |
2024-11-18T20:31:14.437500+00:00 | 1,580,625,742,000 | 72f665b5a1c3c2272892c3315145ccb5d484169c | 3 | {
"blob_id": "72f665b5a1c3c2272892c3315145ccb5d484169c",
"branch_name": "refs/heads/master",
"committer_date": 1580625742000,
"content_id": "ff4b0a917566d65980f031614d524ee6a17893d5",
"detected_licenses": [
"MIT"
],
"directory_id": "413a515d28f34e7efafe68a963f8fa530176e608",
"extension": "py",
"fi... | 2.59375 | stackv2 | import base64
import pickle
from django.shortcuts import render
# Create your views here.
from django_redis import get_redis_connection
from rest_framework import status
from rest_framework.response import Response
from rest_framework.views import APIView
from cart import constants
from cart.serializers import CartS... | 368 | 31.07 | 103 | 19 | 3,172 | python | [{"finding_id": "codeql_py/unsafe-deserialization_25850338b8d8b1ba_ad23d7b5", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depen... | 5 | true | [
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502"
] | [
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided valu... | [
69,
136,
208,
279,
352
] | [
null,
null,
null,
null,
null
] | [
42,
38,
38,
42,
42
] | [
71,
67,
67,
71,
71
] | |
2024-11-18T20:31:16.958614+00:00 | 1,606,043,068,000 | 1b3e3d9cd191238a97df6205999d046c2d54ac7e | 2 | {
"blob_id": "1b3e3d9cd191238a97df6205999d046c2d54ac7e",
"branch_name": "refs/heads/master",
"committer_date": 1606043068000,
"content_id": "c9b930eaa7b7139b75f44eed2dab14ef10227996",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "5e9c8198c909633f218806ccb5736bef3a0825d0",
"extension": "p... | 2.390625 | stackv2 | import requests
import os
import json
from urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
default_payload = '../../../../../../../../etc/hosts'
ports = os.environ.get('PORTS')
urls = ['https://{0}/'.format(os.environ.get('DOMAIN'))]
try:
... | 58 | 29.95 | 95 | 16 | 423 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9d6edbf331cdba93_4a98a243", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
50
] | [
null
] | [
35
] | [
87
] | |
2024-11-18T20:31:22.847682+00:00 | 1,506,717,651,000 | c990eb05d8231ec91b83319ccefc55457244f17c | 3 | {
"blob_id": "c990eb05d8231ec91b83319ccefc55457244f17c",
"branch_name": "refs/heads/master",
"committer_date": 1506717651000,
"content_id": "66cf2728e7d490d781e3ea6b68774173bf30f74c",
"detected_licenses": [
"MIT"
],
"directory_id": "a559b40eb24c15b37d7ece1a8f0ba7920c71404c",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
"""
import cv2
import numpy as np
from argparse import ArgumentParser
from simplejson import load
from os import system
from datetime import datetime, date, timedelta
try:
from urllib.request import Request, urlopen # Python 3
except ImportError:
from urllib2... | 254 | 33.87 | 79 | 16 | 2,004 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_35855686d6ce38f0_1fe39327", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
185
] | [
190
] | [
15
] | [
52
] | |
2024-11-18T20:43:27.932768+00:00 | 1,492,600,413,000 | 6cc057eed7dc9f41e03a9cb529c730b3035675a7 | 3 | {
"blob_id": "6cc057eed7dc9f41e03a9cb529c730b3035675a7",
"branch_name": "refs/heads/master",
"committer_date": 1492600413000,
"content_id": "a74b83cab26aed0e11fb8b775daf530014d38b90",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "057554afbdfec2f8689a999a15ba0848c620ab4f",
"extension": "py"... | 2.578125 | stackv2 | #!/usr/bin/env python2.7
from flask import Flask, request, jsonify
import json, datetime
import sys, os
from string import Template
import xml.etree.ElementTree as ET
import subprocess
import requests
import sys
reload(sys)
sys.setdefaultencoding("utf-8")
import getpass
import csv, codecs
import argparse
import dateti... | 263 | 41.22 | 177 | 22 | 2,857 | python | [{"finding_id": "codeql_py/flask-debug_e5d8c71a299b20e6_e324e6d0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
... | [
256,
259,
34,
67,
70
] | [
null,
null,
null,
null,
null
] | [
6,
7,
16,
20,
20
] | [
59,
60,
110,
78,
168
] | |
2024-11-18T20:43:30.608312+00:00 | 1,571,690,232,000 | 67fe78efc8355438c937bdf7412c6d3da8218dc4 | 3 | {
"blob_id": "67fe78efc8355438c937bdf7412c6d3da8218dc4",
"branch_name": "refs/heads/master",
"committer_date": 1571690232000,
"content_id": "39645abdc62eb2baa9dab0cacd61bf7b36e8096d",
"detected_licenses": [
"MIT"
],
"directory_id": "58c5fbac8b14bd6575fa9a9a24ac697b2dd312c3",
"extension": "py",
"fi... | 2.8125 | stackv2 | import requests
import typing
import logging
BASE_EMOJI_URL = "https://unicodey.com/emoji-data/img-google-64/{image_link}"
EMOJI_API_URL = "https://slack.com/api/emoji.list?token={oauth_token}"
logger = logging.getLogger()
class EmojiUrlGenerator:
def __init__(self,
default_emoji_list: typing.L... | 41 | 37.29 | 91 | 16 | 346 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bd92c5799e807d67_ab2c8c77", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
51
] | [
66
] | |
2024-11-18T20:43:32.852669+00:00 | 1,575,557,119,000 | 640755fdb13b597443df8f1445edd9a77c985157 | 2 | {
"blob_id": "640755fdb13b597443df8f1445edd9a77c985157",
"branch_name": "refs/heads/master",
"committer_date": 1575557119000,
"content_id": "ce7fe4aaa39b3bb6b4488a08d89e251b60a7d18b",
"detected_licenses": [
"MIT"
],
"directory_id": "249e8641cd9adcf37b5509a8b2ac396ada1db14d",
"extension": "py",
"fi... | 2.5 | stackv2 | import os
import HP
def main():
# create directory for patient
if not os.path.exists(HP.insight_patient_data_directory):
os.makedirs(HP.insight_patient_data_directory)
else:
raise IOError
# get the patient file and store it into multiple files (one file per sentence)
f = open(HP.dat... | 38 | 39.13 | 118 | 17 | 354 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_499c84e583e190a1_b116885c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
34
] | [
null
] | [
55
] | [
98
] | |
2024-11-18T20:43:53.355157+00:00 | 1,512,277,969,000 | 1f3601638a91742e4e375e0beab835dba4fa366e | 2 | {
"blob_id": "1f3601638a91742e4e375e0beab835dba4fa366e",
"branch_name": "refs/heads/master",
"committer_date": 1512277969000,
"content_id": "8800ebe371a32d00a3cb9a52a30adb483bd439cc",
"detected_licenses": [
"MIT"
],
"directory_id": "b771ac7f9d5e6ec0a82eda26af36c6554ffd1c5f",
"extension": "py",
"fi... | 2.359375 | stackv2 | # Python module to interface with Shenzhen Xenon ESP8266MOD WiFi smart devices
# E.g. https://wikidevi.com/wiki/Xenon_SM-PW701U
# SKYROKU SM-PW701U Wi-Fi Plug Smart Plug
# Wuudi SM-S0301-US - WIFI Smart Power Socket Multi Plug with 4 AC Outlets and 4 USB Charging Works with Alexa
#
# This would not exist without th... | 300 | 41.97 | 160 | 18 | 3,343 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_edca1f1ce3a6d24d_a2040ff5", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
53
] | [
null
] | [
28
] | [
47
] | |
2024-11-18T20:43:53.423053+00:00 | 1,556,625,583,000 | 57a9f1d7f6dd9a98c7054cf155493c0061771b21 | 2 | {
"blob_id": "57a9f1d7f6dd9a98c7054cf155493c0061771b21",
"branch_name": "refs/heads/master",
"committer_date": 1556625583000,
"content_id": "48e89abe5d3f6ac184adb3ff6c03a8fb7d76d310",
"detected_licenses": [
"MIT"
],
"directory_id": "f935aeff1a7c465fedf1d1d9ac829eff357f4801",
"extension": "py",
"fi... | 2.5 | stackv2 | from flask import render_template, url_for, flash, redirect, request, abort
from blog.forms import RegistrationForm, LoginForm, PostForm, CommentForm
from blog.models import User, Post, Comment
from blog import app, db, bcrypt
from flask_login import login_user, logout_user, current_user, login_required
import requests... | 131 | 32.31 | 97 | 16 | 935 | python | [{"finding_id": "codeql_py/url-redirection_f670331500f4ba30_06a8c4a2", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
47
] | [
null
] | [
29
] | [
38
] | |
2024-11-18T20:44:11.166167+00:00 | 1,515,165,238,000 | 6c56b558fec343fe24b6585dccf51c500ffbf5ba | 2 | {
"blob_id": "6c56b558fec343fe24b6585dccf51c500ffbf5ba",
"branch_name": "refs/heads/master",
"committer_date": 1515165238000,
"content_id": "e631b7c56d1094fbfc994f792179de600f2fa9c1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "acddacb76e8452835ed9a2903805fb0aedf98c69",
"extension": "py"... | 2.390625 | stackv2 | import argparse
import random
import logging
from flask import Flask, request, abort
from solver import JumpGameSolver, SolverInputException
app = Flask(__name__)
app.config.from_object('server_config')
solver = None # type: JumpGameSolver
@app.route('/', methods=['POST'], strict_slashes=False)
def handler():
... | 104 | 29.66 | 77 | 15 | 714 | python | [{"finding_id": "codeql_py/log-injection_e246a30dbb869034_644bb218", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
49
] | [
55
] | |
2024-11-18T20:57:55.799309+00:00 | 1,462,825,196,000 | c425d9ce3738b3d70a0f2fa3bcedeec54941368e | 3 | {
"blob_id": "c425d9ce3738b3d70a0f2fa3bcedeec54941368e",
"branch_name": "refs/heads/master",
"committer_date": 1462825196000,
"content_id": "96b74ca17b74552c4a92693e68cfef95b7e15d85",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "8b88e0955ce4a3a39fd52cabfd1d9df0b6ecab1f",
"extension": "p... | 2.546875 | stackv2 | import numpy as np
import matplotlib.pyplot as plt
import matplotlib.mlab as mlab
import pysox
import subprocess as sp
import time
import os
import re
from ._base_module import BaseModule
class FftAnalysis(BaseModule):
def __init__(self, connector):
super(FftAnalysis, self).__init__(connector)
sel... | 80 | 33.38 | 85 | 16 | 620 | python | [{"finding_id": "codeql_py/overly-permissive-file_58621313c9729a45_0a33b22f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
39
] | [
null
] | [
9
] | [
36
] | |
2024-11-18T20:57:58.692664+00:00 | 1,593,715,268,000 | 7be8d98ee3af66f58683e82f5817dd3865e63165 | 3 | {
"blob_id": "7be8d98ee3af66f58683e82f5817dd3865e63165",
"branch_name": "refs/heads/master",
"committer_date": 1593715268000,
"content_id": "feda459c8123407cf53096f28c805421e375f313",
"detected_licenses": [
"MIT"
],
"directory_id": "9ea87c10180665db0db6fa36997704acc001692d",
"extension": "py",
"fi... | 3.140625 | stackv2 | #!/usr/bin/python3
# used to encrypt a byte string
# used as a tool for testing
# AES encryption
from Crypto.Cipher import AES
import base64
import os
import sys
import binascii
def rawpad(s,BLOCK_SIZE):
#pad it with the characters representing original block size length
return s + (BLOCK_SIZE - len(s) % BL... | 107 | 28.36 | 95 | 15 | 953 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_004e57db80dc6087_12143fef", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode CTR](2) is broken or weak, and should not be used.\n[The block mode ECB](3) is broken or weak, and should not be used.\n[The block mode CBC](4) is broken or weak, and should not be used.\n[The block mode CTR](5) is broken or weak, ... | [
80,
103
] | [
null,
null
] | [
10,
10
] | [
33,
33
] | |
2024-11-18T20:58:05.441268+00:00 | 1,616,428,347,000 | da67b8b2b68fbb036649007b95078d8fae050184 | 2 | {
"blob_id": "da67b8b2b68fbb036649007b95078d8fae050184",
"branch_name": "refs/heads/main",
"committer_date": 1616428347000,
"content_id": "a6d39e1e2d4a16721dcc3c6105f9f97f6fbfb9fc",
"detected_licenses": [
"MIT"
],
"directory_id": "6938cdd2b41ca2af38c35a95e0fad91315b20ad1",
"extension": "py",
"file... | 2.453125 | stackv2 | import os
import shutil
import time
from os.path import splitext
from pathlib import Path
from urllib.parse import urlsplit
import requests
import urllib3
from PIL import Image
from dotenv import load_dotenv
from instabot import Bot
def download_image(url, image_name, images_folder='images'):
response = get_resp... | 176 | 27.85 | 74 | 14 | 1,160 | python | [{"finding_id": "codeql_py/request-without-cert-validation_57e1f6240c799c65_01e85a60", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
63
] | [
null
] | [
16
] | [
55
] | |
2024-11-18T20:58:35.037589+00:00 | 1,627,618,019,000 | 8fedfffea882f388f9d0d6ff0b5ea3cfb7e6b0fb | 2 | {
"blob_id": "8fedfffea882f388f9d0d6ff0b5ea3cfb7e6b0fb",
"branch_name": "refs/heads/master",
"committer_date": 1627618019000,
"content_id": "9a9b7219434dbf2df325929a4496325714a0938c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "48a1decfc9916c837dbfb6c8c2419d8124f45ee1",
"extension": "py"... | 2.453125 | stackv2 | # To add default values in config - python collection_config.py
# To add customised config - python collection_config.py -a "1.1.1.1" -u "Admin" -p "admin" -d "OVAD" -i "1.1.2.2" -v 3200 -w "Synergy" -l oneview-ansible-collection
import argparse
import os
config_file = 'oneview_config.json'
def replace_config_file(co... | 64 | 40.06 | 165 | 13 | 638 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_85824bfacee6df42_15775625", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
10
] | [
null
] | [
19
] | [
25
] | |
2024-11-18T20:58:35.559700+00:00 | 1,526,907,158,000 | cbfd2de3851517aeee9bc01695b27a744553a6ff | 3 | {
"blob_id": "cbfd2de3851517aeee9bc01695b27a744553a6ff",
"branch_name": "refs/heads/master",
"committer_date": 1526907158000,
"content_id": "0dd0a143851eca5dc3426b33cd9527fde9a2eff4",
"detected_licenses": [
"MIT"
],
"directory_id": "19c70ba188159e4ff9a1b15b3b2e14ad96dd1479",
"extension": "py",
"fi... | 2.703125 | stackv2 | import re
import glob
import random
from pathlib import Path
import os
import json
import time
dictionary_pattern = "(?:\')+([0-9a-zA-Z]{1,})+(?:\')"
root_name = "dataset/groups"
consumed_root_name = "consumed/groups"
dicitonary_addr = "dataset/dictionaries/"
dictionary_tags = dicitonary_addr + 'tags.txt'
#Addresses ... | 235 | 25.56 | 123 | 19 | 1,517 | python | [{"finding_id": "codeql_py/redos_2dc47ff2fb84dfb3_d37404d2", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetitions of '0'."
] | [
9
] | [
null
] | [
30
] | [
45
] | |
2024-11-18T21:10:11.747427+00:00 | 1,544,006,585,000 | 3ebfb605d373d920ed62bdb990cf86b9bdc554cc | 2 | {
"blob_id": "3ebfb605d373d920ed62bdb990cf86b9bdc554cc",
"branch_name": "refs/heads/master",
"committer_date": 1544006585000,
"content_id": "12a3d61d9fc29da9f103bde445ad575320eaabda",
"detected_licenses": [
"MIT"
],
"directory_id": "c1117b47bd9c328dfcbc1045050001ab5f30f87a",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, request, render_template, url_for, flash, g
from flask_cors import CORS
from flask_restful import Resource, Api
import json
import requests
from deliveryDB import Database
import mysql.connector
app = Flask(__name__)
api = Api(app)
app.config["SECRET_KEY"] = "mysecret"
# Pass inn app.config ... | 172 | 27.95 | 86 | 17 | 1,256 | python | [{"finding_id": "codeql_py/flask-debug_225c16f2a3a4210c_21c4d08e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
172,
162,
168
] | [
null,
null,
null
] | [
5,
12,
12
] | [
53,
74,
39
] | |
2024-11-18T21:10:23.714012+00:00 | 1,488,338,336,000 | 50b8d8e67eb3102a67f34ae6248c27ec51e94cf0 | 3 | {
"blob_id": "50b8d8e67eb3102a67f34ae6248c27ec51e94cf0",
"branch_name": "refs/heads/master",
"committer_date": 1488338336000,
"content_id": "e9deb8e5ba4e4a0f23684312cfa915d5ca3a3d63",
"detected_licenses": [
"MIT"
],
"directory_id": "16429e9c81ea35097fe8dae4445d1975539e9ee5",
"extension": "py",
"fi... | 3.34375 | stackv2 | # pylint: disable=C0103
"""
Take an input image
Hide text in the image
Optional password
"""
import sys
import struct
import os
import base64
from PIL import Image
import numpy as np
import bitarray as ba
from Crypto.Cipher import AES
def encrypt_string(inputString, key=None):
"""
encrypts inputString using ... | 76 | 23.53 | 77 | 18 | 502 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cc202356a86b0363_93531c07", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
32
] | [
null
] | [
22
] | [
27
] | |
2024-11-18T21:10:27.776135+00:00 | 1,468,512,830,000 | 08865caa7ff6a780cc4b7fb46fe7141e8ac37b73 | 3 | {
"blob_id": "08865caa7ff6a780cc4b7fb46fe7141e8ac37b73",
"branch_name": "refs/heads/master",
"committer_date": 1468512830000,
"content_id": "b4b2b6012f118d91ff59b5b8f71aa372094e8372",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "35f9ba79f017ad056235a7a33d6220c6ab5c88b5",
"extension": "py"... | 2.640625 | stackv2 | """ Provides simple templating for Mondrian XML files.
In the future the XSD file for the Mondrian schema might be used.
"""
from jinja2 import Environment, PackageLoader
def level_type(level_type):
""" Custom filter for mapping the pylytics dimension type to a Mondrian
type.
"""
return ('Numeric' ... | 45 | 25.62 | 75 | 13 | 270 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1576d1f9876bf5b8_d867629d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
27
] | [
32
] | [
11
] | [
10
] | |
2024-11-18T21:10:28.952138+00:00 | 1,599,871,435,000 | ed76b8a98f2d58a1f10e9a25548851a1a04347e1 | 3 | {
"blob_id": "ed76b8a98f2d58a1f10e9a25548851a1a04347e1",
"branch_name": "refs/heads/master",
"committer_date": 1621181568000,
"content_id": "44ccdb728a86bd18a6b0227c0ca1fad5b9fb2993",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "27b99f002b35d22afa52d2db3410be57c114c007",
"extension": "p... | 3.09375 | stackv2 | import os
from functools import partial
from pluginbase import PluginBase
# For easier usage calculate the path relative to here.
here = os.path.abspath(os.path.dirname(__file__))
get_path = partial(os.path.join, here)
# Setup a plugin base for "example.modules" and make sure to load
# all the default built-in plug... | 79 | 33.41 | 74 | 16 | 600 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1b410dcbd6cfd51c_7558ed3e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
75
] | [
null
] | [
15
] | [
43
] | |
2024-11-18T21:10:30.824738+00:00 | 1,619,204,973,000 | dc5bf3d26427aaee1ae688dadebf4823ec269088 | 3 | {
"blob_id": "dc5bf3d26427aaee1ae688dadebf4823ec269088",
"branch_name": "refs/heads/master",
"committer_date": 1619204973000,
"content_id": "9f0eca21d19448da375c8443b99329a07868fc21",
"detected_licenses": [
"MIT"
],
"directory_id": "3b1053ea38fee9a59d335dd75bb6a6906d298594",
"extension": "py",
"fi... | 2.671875 | stackv2 | import datetime
import gzip
import os
import re
import shutil
import subprocess
import sys
import tarfile
import tempfile
from random import choice
from string import ascii_letters, ascii_lowercase, digits
from typing import Iterable, Union
import arrow
RE_STATIC_HASH = re.compile("^main.([a-z0-9]+).css$")
SUB_DIRS ... | 304 | 23.62 | 120 | 16 | 1,809 | python | [{"finding_id": "codeql_py/tarslip_279eb6f5ddda737f_5690d01c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
148
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T21:10:48.364977+00:00 | 1,514,633,924,000 | 3b5782200360c21282a206788e411c8da86a6384 | 2 | {
"blob_id": "3b5782200360c21282a206788e411c8da86a6384",
"branch_name": "refs/heads/master",
"committer_date": 1514633924000,
"content_id": "71731bd2a05b551c08d22169e487b58d863aed8a",
"detected_licenses": [
"MIT"
],
"directory_id": "ac9ac7c85dc91149cf5b277e142e7333fdf23224",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/env python
import os
import sys
import yaml
import json
import requests
import datetime as dt
import shutil
from requests.auth import HTTPBasicAuth
#from BeautifulSoup4 import BeautifulSoup
#from more_itertools import unique_everseen
#from urlparse import urljoin
class pyFS(object):
"""ForeScout Web... | 325 | 37.39 | 130 | 20 | 2,812 | python | [{"finding_id": "codeql_py/request-without-cert-validation_72c4de54861f9849_776b516a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 10 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
99,
117,
124,
138,
154,
214,
231,
253,
266,
317
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
13,
13,
21,
17,
20,
20,
24,
20,
20,
20
] | [
92,
92,
115,
111,
73,
73,
77,
73,
73,
73
] | |
2024-11-18T21:10:50.703405+00:00 | 1,494,615,108,000 | cf76a556c160b2cbe967730008be441c01dda2b7 | 3 | {
"blob_id": "cf76a556c160b2cbe967730008be441c01dda2b7",
"branch_name": "refs/heads/master",
"committer_date": 1494615108000,
"content_id": "5850803c8fb53a491c1b926e3854d8c8f9e34b68",
"detected_licenses": [
"MIT"
],
"directory_id": "cfd4fdc997686f17599422bc7f16ddcb966e8e6e",
"extension": "py",
"fi... | 2.703125 | stackv2 | import random
import hashlib
from string import letters
from google.appengine.ext import db
def make_salt(length = 5):
return ''.join(random.choice(letters) for x in xrange(length))
def make_pw_hash(name, pw, salt = None):
if not salt:
salt = make_salt()
h = hashlib.sha256(name + pw + salt).hexdigest()
return '... | 80 | 26.15 | 77 | 15 | 539 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7d40908e5f8c425b_02314a21", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
12
] | [
null
] | [
21
] | [
37
] | |
2024-11-18T19:03:21.755964+00:00 | 1,624,457,876,000 | 3de0f67bf61f29762b8a11f352c4767efa13ab34 | 3 | {
"blob_id": "3de0f67bf61f29762b8a11f352c4767efa13ab34",
"branch_name": "refs/heads/main",
"committer_date": 1624457876000,
"content_id": "b9fa12e6fb680590385f018a2f211229c7d85f37",
"detected_licenses": [
"MIT"
],
"directory_id": "08b0c54b66addc4a968fa245662ee3f63a3752bc",
"extension": "py",
"file... | 3.21875 | stackv2 | # %%
# import libraries
import os
import csv
from pathlib import Path
from datetime import datetime
from collections import Counter
ROOT_PATH = Path(os.path.dirname(__file__)).parent
# %%
# read mimic data
# Include demographics (Gender, Date of Birth, Ethnicity)
patients_data_path = f'{ROOT_PATH}/data/mimic/PATIENTS.... | 210 | 29.03 | 147 | 13 | 2,228 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d25ba4ed5782bfc9_b3713e5b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
105,
108
] | [
null,
null
] | [
7,
7
] | [
31,
30
] | |
2024-11-18T19:03:22.262609+00:00 | 1,491,607,452,000 | bab970cbc54b578911681b41b0af65df8c86ef29 | 3 | {
"blob_id": "bab970cbc54b578911681b41b0af65df8c86ef29",
"branch_name": "refs/heads/master",
"committer_date": 1491607452000,
"content_id": "86946924b2912f755ed4571cd017b3b56e7dd364",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "5c78ee27530a47d56164aab72548ce4ff0523c5e",
"extension": "p... | 2.71875 | stackv2 | import argparse
import os
import csv
import pickle
import re
import string
from collections import defaultdict
import operator
import copy
import time
import pandas as pd
parser = argparse.ArgumentParser(description='early modern standardizer (VARD alternative) - works on early modern english text files')
parser.add_a... | 299 | 43.44 | 137 | 29 | 2,847 | python | [{"finding_id": "codeql_py/overly-large-range_3264c40436ec1cb0_1f06954b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
181,
181
] | [
null,
null
] | [
37,
61
] | [
40,
64
] | |
2024-11-18T19:03:29.381072+00:00 | 1,587,949,774,000 | d1635756cd26c53c31c7741f2dd1d1d755e9601e | 2 | {
"blob_id": "d1635756cd26c53c31c7741f2dd1d1d755e9601e",
"branch_name": "refs/heads/master",
"committer_date": 1587949774000,
"content_id": "aebb7583fc2c4cf325bd252afb4f33ea823cc085",
"detected_licenses": [],
"directory_id": "ab62d2707cdd7beba56004321ad39d7f5fedc751",
"extension": "py",
"filename": "rou... | 2.328125 | stackv2 | """
Routes
~~~~~~
"""
from flask import Blueprint
from flask import flash
from flask import redirect
from flask import render_template
from flask import request
from flask import current_app
from flask import url_for
from flask_login import current_user
from flask_login import login_required
from flask_login im... | 340 | 28.25 | 150 | 17 | 2,288 | python | [{"finding_id": "codeql_py/url-redirection_8395f40127d0d639_9a2537ef", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
192
] | [
null
] | [
25
] | [
74
] | |
2024-11-18T19:28:35.987978+00:00 | 1,523,348,655,000 | c1fb2def3fe644d4e73f27fb7cbe6ca5d83037c5 | 2 | {
"blob_id": "c1fb2def3fe644d4e73f27fb7cbe6ca5d83037c5",
"branch_name": "refs/heads/master",
"committer_date": 1523348655000,
"content_id": "7cbde1d3a11762d03018d93df6b39522d8805a4c",
"detected_licenses": [
"MIT"
],
"directory_id": "8e3f92951374ba05085d9f4fe68da7cf7d90c3ce",
"extension": "py",
"fi... | 2.5 | stackv2 | #coding:utf-8
import requests
import json
class RunMethod:
def post_main(self,url,data,header=None):
res = None
if header !=None:
res = requests.post(url=url,data=json.dumps(data),headers=header)
else:
res = requests.post(url=url,data=data)
return res.json()
def get_main(self,url,data=None,header=None)... | 30 | 25.7 | 68 | 15 | 211 | python | [{"finding_id": "codeql_py/request-without-cert-validation_79e2ee763f9b8526_096f02b3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
16,
18
] | [
null,
null
] | [
10,
10
] | [
69,
54
] | |
2024-11-18T19:28:47.823044+00:00 | 1,547,185,274,000 | 6c4b690b8e67134a2926c6c9acc9d43d7a2d6815 | 2 | {
"blob_id": "6c4b690b8e67134a2926c6c9acc9d43d7a2d6815",
"branch_name": "refs/heads/master",
"committer_date": 1547185274000,
"content_id": "903445e91df38a2c0791dd843d809ecde9c5f4f3",
"detected_licenses": [
"MIT"
],
"directory_id": "963b70d354dc81e783204e57dfee1fd47f956a00",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
import sys
import pickle
import tarfile
import argparse
from pathlib import Path
import torch
import torch.utils.data
from urllib.request import urlopen
import libs.augmentaion as augmentaion
import libs.models as models
class Dataset(object):
def __init__(self, data, labels):
self... | 180 | 36.04 | 103 | 16 | 1,455 | python | [{"finding_id": "codeql_py/tarslip_e7e75335cd6198eb_f0947f9d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
68
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T19:28:59.021814+00:00 | 1,431,965,689,000 | be128dad6410e6cdb8d9573993626c76ad7b0ef8 | 3 | {
"blob_id": "be128dad6410e6cdb8d9573993626c76ad7b0ef8",
"branch_name": "refs/heads/master",
"committer_date": 1431965689000,
"content_id": "7995e1313ad697b39a57d7103ae515ef31aac251",
"detected_licenses": [
"MIT"
],
"directory_id": "360521fa169b9cde78f314558f86bc3c54d9bf1c",
"extension": "py",
"fi... | 2.71875 | stackv2 | import os
import sys
import re
import platform
import gevent
from gevent import monkey
monkey.patch_all()
import requests
from lxml import etree
from more_itertools import chunked
from .utils import get_image_info, parse_url
from .exceptions import URLParseError
REQUEST_HEADERS = {'User-agent': 'Mozilla/5.0 (Maci... | 145 | 24.43 | 155 | 18 | 912 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_a24143894814e8b4_dade68cd", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [ck101.com](1) may be at an arbitrary position in the s... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [ck101.com](1) may be at an arbitrary position in the sanitized URL."
] | [
29
] | [
null
] | [
8
] | [
26
] | |
2024-11-18T19:39:59.596896+00:00 | 1,634,110,724,000 | f1162c5ea0db78d29570021537806de7be70f0fe | 2 | {
"blob_id": "f1162c5ea0db78d29570021537806de7be70f0fe",
"branch_name": "refs/heads/master",
"committer_date": 1634110724000,
"content_id": "cf6feedf74d93c9965292d357645157c97e2d355",
"detected_licenses": [
"MIT"
],
"directory_id": "82ab25a8039c9d2cb5fc51aac5b68142ff9e08aa",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
from flask import Flask, render_template_string, request, redirect, make_response
import wargaming
app = Flask(__name__)
wot = wargaming.WoT(os.environ['WARGAMING_API'], language='ru', region='ru')
HTML_TEMPLATE = """<!doctype html>
<title>Wargaming AUTH</title>
{% if error %}
<p style="color: red">Error:... | 62 | 25.48 | 86 | 14 | 443 | python | [{"finding_id": "codeql_py/cookie-injection_11890cc85b12b6dd_d61ff6be", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/cookie-injection",
"py/cookie-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"Cookie is constructed from a [user-supplied input](1)."
] | [
56,
56
] | [
null,
null
] | [
33,
36
] | [
34,
37
] | |
2024-11-18T19:40:02.780172+00:00 | 1,559,154,341,000 | 2a592083505365a59568bd4b38d2b9e53477844b | 2 | {
"blob_id": "2a592083505365a59568bd4b38d2b9e53477844b",
"branch_name": "refs/heads/master",
"committer_date": 1559154341000,
"content_id": "498af151e801449676f955bb4d522a479d43c188",
"detected_licenses": [
"Unlicense"
],
"directory_id": "6f2a6a935501cb2193d62bb77aed01f6e63d8f0c",
"extension": "py",... | 2.46875 | stackv2 | import requests
from jinja2 import Template
#use pip install jinja2 if you get a module error
import sys
import login
import getpass
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
urllib3.disable_warnings(urllib3.exceptions.SNIMissingWarning)
urllib3.disable_warnings(urllib3.exceptio... | 69 | 30.83 | 96 | 10 | 540 | python | [{"finding_id": "codeql_py/request-without-cert-validation_693e9a6d9c49e7db_9427094d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-079",
"CWE-079"
] | [
"py/request-without-cert-validation",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
47,
31,
43
] | [
null,
null,
null
] | [
19,
14,
14
] | [
96,
35,
39
] | |
2024-11-18T20:18:04.276590+00:00 | 1,635,976,351,000 | 8fb0e7c177782031c6327822664237af31e9a2c4 | 2 | {
"blob_id": "8fb0e7c177782031c6327822664237af31e9a2c4",
"branch_name": "refs/heads/main",
"committer_date": 1635976351000,
"content_id": "9f7b6dc6e1800d1c3347756f61657fb9bcbc7c9b",
"detected_licenses": [
"MIT"
],
"directory_id": "b7e67c532771365a15e968ca1e1dda712712fbe0",
"extension": "py",
"file... | 2.4375 | stackv2 | from flask import Flask
from flask_cors import CORS,cross_origin
from smbus import SMBus
import time
import json
import datetime
# I2C simplified: 0x5E
EE895ADDRESS = 0x5E
I2CREGISTER = 0x00
app = Flask(__name__)
def read_sensor_data(i2cbus):
read_data = i2cbus.read_i2c_block_data(EE895ADDRESS, I2CREGISTER, 8)... | 51 | 34.59 | 118 | 16 | 548 | python | [{"finding_id": "codeql_py/stack-trace-exposure_aa715c65b8d6aefe_2fb0ed3e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
51
] | [
null
] | [
16
] | [
67
] | |
2024-11-18T20:18:21.815451+00:00 | 1,601,901,254,000 | 1bad42c3492947e9df7db64014e25ab8022e0637 | 3 | {
"blob_id": "1bad42c3492947e9df7db64014e25ab8022e0637",
"branch_name": "refs/heads/master",
"committer_date": 1601901254000,
"content_id": "5dc226116176620ee8357949008676a08efd15e0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b12700aec6fca88ffeafd1452cbb11242f560354",
"extension": "py"... | 2.765625 | stackv2 | #!/usr/bin/python3
#
#
# ====================================================
# Python Blogger REST API v3
# ====================================================
#
#
# Author:
# Suraj Singh Bisht
# surajsinghbisht054@gmail.com
# www.bitforestinfo.com
# www.blaregro... | 112 | 28.11 | 95 | 9 | 742 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_88ad702bcbfc27e1_1f0ee571", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
87,
97,
102
] | [
null,
null,
null
] | [
11,
11,
11
] | [
53,
57,
62
] | |
2024-11-18T20:18:23.576010+00:00 | 1,689,781,839,000 | edc30c2df378aad633d8474185728e09248d9c1f | 2 | {
"blob_id": "edc30c2df378aad633d8474185728e09248d9c1f",
"branch_name": "refs/heads/main",
"committer_date": 1689781839000,
"content_id": "6bb6dcaff2ddb432f981d8f75d061fe8aec08336",
"detected_licenses": [
"MIT"
],
"directory_id": "25f8e3cdc0819c908da516f476ff4b0149cc374b",
"extension": "py",
"file... | 2.5 | stackv2 | import os
from tempfile import NamedTemporaryFile
from zipfile import ZipFile
from ozy import OzyError
# TODO support sha256, sha256_signature and sha256_gpg_key
from ozy.installer import Installer
from ozy.utils import download_to_file_obj
class SingleBinaryZipInstaller(Installer):
def __init__(self, name, conf... | 52 | 32.81 | 91 | 17 | 423 | python | [{"finding_id": "codeql_py/overly-permissive-file_6ede78647684a60f_b3d61e25", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
33,
52
] | [
null,
null
] | [
13,
9
] | [
38,
69
] | |
2024-11-18T20:18:27.969661+00:00 | 1,444,226,418,000 | 370208083dfa1db37ecc54bafd59ad28da4afa54 | 2 | {
"blob_id": "370208083dfa1db37ecc54bafd59ad28da4afa54",
"branch_name": "refs/heads/master",
"committer_date": 1444226418000,
"content_id": "9164ff00e5a35f78a99012295dfa39140bb10e44",
"detected_licenses": [
"MIT"
],
"directory_id": "9a502e64f7d67fdf2c09a01b2c962efacb6005a1",
"extension": "py",
"fi... | 2.34375 | stackv2 | # -*- coding: utf-8 -*-
from principal.utils.GestionAlumnosUtils import secret_key
import getpass
import os
BASE_DIR = os.path.dirname(os.path.abspath(__file__))
hosts = []
print('\nAllowed hosts\n')
host = input('Please, enter the server IP address: ')
hosts.append(host)
database = {}
attributes = {}
print('\n... | 117 | 30.56 | 86 | 14 | 930 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bb96ce97e1d45a31_0b659a93", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression stores [sensiti... | [
89,
95
] | [
null,
null
] | [
9,
9
] | [
78,
53
] | |
2024-11-18T20:18:42.635905+00:00 | 1,552,028,835,000 | bd14767ef134a66e2e1ddce1830df860ff669462 | 3 | {
"blob_id": "bd14767ef134a66e2e1ddce1830df860ff669462",
"branch_name": "refs/heads/master",
"committer_date": 1552028835000,
"content_id": "d73878c43a970b3fe9be73d84033267d20174846",
"detected_licenses": [
"MIT"
],
"directory_id": "8fff860b7b3097d27593694f4686be161ff3395d",
"extension": "py",
"fi... | 2.859375 | stackv2 | import pandas as pd
import csv
import os
import matplotlib.pyplot as plt
daily_heart_data = pd.read_csv("dailyRestingHeartRate.csv")
quarter_hour_heart_data = pd.read_csv("heartrate_15min.csv")
hourly_steps = pd.read_csv("hourlySteps.csv")
daily_steps = pd.read_csv("dailySteps.csv")
sleep_data = pd.read_csv("sleep_sta... | 41 | 32.32 | 85 | 9 | 362 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97121ff3b574c80b_91b58f5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
27
] | [
null
] | [
34
] | [
48
] | |
2024-11-18T20:18:46.984371+00:00 | 1,613,073,873,000 | 71aee1c5f21b947e46ede634aa3b24853e217c11 | 3 | {
"blob_id": "71aee1c5f21b947e46ede634aa3b24853e217c11",
"branch_name": "refs/heads/master",
"committer_date": 1613073873000,
"content_id": "9db85634b8959adfc472e48b899101a0a299e464",
"detected_licenses": [
"MIT"
],
"directory_id": "c58b7658e1306246470b50d93eae71a46b90a718",
"extension": "py",
"fi... | 2.625 | stackv2 | import re, string
from nltk.corpus import stopwords
def remove_emojis(data): # https://stackoverflow.com/a/58356570/6196010
emojis = re.compile("["
u"\U0001F600-\U0001F64F" # emoticons
u"\U0001F300-\U0001F5FF" # symbols & pictographs
u"\U0... | 51 | 41.08 | 165 | 13 | 722 | python | [{"finding_id": "codeql_py/overly-large-range_b4db010b179085c7_6b89d65c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 9 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
7,
7,
7,
7,
7,
7,
8,
8,
8
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
27,
30,
33,
36,
39,
42,
27,
30,
39
] | [
31,
34,
37,
40,
43,
46,
31,
34,
43
] | |
2024-11-18T20:18:57.728471+00:00 | 1,616,756,689,000 | 2523c918321736dde8018cc6c84019282792ced8 | 2 | {
"blob_id": "2523c918321736dde8018cc6c84019282792ced8",
"branch_name": "refs/heads/main",
"committer_date": 1616756689000,
"content_id": "d01491893806d21798077aa26a3a7972556d4f8c",
"detected_licenses": [
"MIT"
],
"directory_id": "1028fd8b12200fdcb4f575677c16d8df026d94ac",
"extension": "py",
"file... | 2.3125 | stackv2 | from blockchain import Blockchain
import json
from flask_cors import CORS, cross_origin
from time import time
blockchain = Blockchain()
from flask import Flask, request
app = Flask(__name__)
CORS(app)
@app.route('/chain', methods=['GET'])
def chain():
return json.dumps([{'block':block, 'id':blockchain.getBlockI... | 56 | 28.16 | 115 | 13 | 359 | python | [{"finding_id": "codeql_py/reflective-xss_0946e8e40cc1c4c8_ca89a58b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
42
] | [
null
] | [
12
] | [
46
] | |
2024-11-18T20:29:35.339030+00:00 | 1,612,068,108,000 | b464ca29ec93703d50daddcb5e502949634a654f | 3 | {
"blob_id": "b464ca29ec93703d50daddcb5e502949634a654f",
"branch_name": "refs/heads/master",
"committer_date": 1612068108000,
"content_id": "dcabc20cb0dfdcfa243850dfc19b600ffcf95260",
"detected_licenses": [
"MIT"
],
"directory_id": "2f4281da5b2e94da8304a78e90628c40e205b743",
"extension": "py",
"fi... | 2.515625 | stackv2 | import re
import requests
from lxml import etree
from requests.exceptions import ConnectionError
class ParsePrem():
def __init__(self):
super().__init__()
self.js_id = None
self.proxies = {
"http": "http://127.0.0.1:54321",
"https": "http://127.0.0.1:54321"
... | 117 | 31.67 | 154 | 19 | 1,012 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03facc23d7b670d6_4f5182c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
116
] | [
null
] | [
11
] | [
27
] | |
2024-11-18T20:29:52.097800+00:00 | 1,445,320,670,000 | 5414ecb1dfd0f0ba1436c92e44410af40fceecbc | 2 | {
"blob_id": "5414ecb1dfd0f0ba1436c92e44410af40fceecbc",
"branch_name": "refs/heads/master",
"committer_date": 1445320670000,
"content_id": "26015e6f9252566e0265ece5221e14aaf6a61c87",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "aa7d8d08ba14de976d0202f103a644e41264da71",
"extension": "py"... | 2.390625 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
#Description: List all exam and its details of a specific course
#Query String Variables: cid(course_id)
#Operation: Create New Option, Modify Previously Created Exams
#Created: April 18, 2015
#Last Modified: April 18, 2015
#Author: Optimus Prime
print "Content-Type: text/htm... | 92 | 32.71 | 148 | 16 | 834 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_86eac1c34be2ba62_3a80d1b0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
null
] | [
15
] | [
51
] | |
2024-11-18T20:29:55.051704+00:00 | 1,545,953,185,000 | 843b01a69a2230ef5590583b104ef7ddd81eb2f9 | 2 | {
"blob_id": "843b01a69a2230ef5590583b104ef7ddd81eb2f9",
"branch_name": "refs/heads/master",
"committer_date": 1545953185000,
"content_id": "4b5063fd7cde8331f32648f4a879e6f982f81ce1",
"detected_licenses": [
"MIT"
],
"directory_id": "20260f05d91340486ee1feace8fd35c8672be103",
"extension": "py",
"fi... | 2.484375 | stackv2 | import sys
import json
from flask import Flask, request, jsonify, abort, send_from_directory, render_template
from functools import wraps
from ConfigImport import ConfigImport
from Model import Model
# define the constants and variables
Config = ConfigImport()
class QuestionHandler:
def __init__(self, app):
... | 40 | 36.3 | 111 | 20 | 276 | python | [{"finding_id": "codeql_py/stack-trace-exposure_5f2f892cebf41460_94e611e4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
32
] | [
34
] | [
32
] | [
49
] | |
2024-11-18T20:29:58.280975+00:00 | 1,497,287,686,000 | a80f853cb9cfec419bfab2df6730d631b817862e | 2 | {
"blob_id": "a80f853cb9cfec419bfab2df6730d631b817862e",
"branch_name": "refs/heads/master",
"committer_date": 1497287718000,
"content_id": "47c1850adab051d8879c71a5ee8f182263221865",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7c1906e0c0b90b0a96bd5be3d8d54f195e7f22bc",
"extension": "py"... | 2.421875 | stackv2 | import json
import datetime
import tornado.web
import re
from biothings.utils.www.analytics import GAMixIn
from biothings.utils.common import is_str, is_seq
try:
from raven.contrib.tornado import SentryMixin
except ImportError:
# dummy class mixin
class SentryMixin(object):
pass
try:
from re im... | 201 | 45.04 | 167 | 20 | 2,075 | python | [{"finding_id": "codeql_py/log-injection_cb597628cf2d817e_2491d108", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)."
] | [
67
] | [
null
] | [
31
] | [
35
] | |
2024-11-18T20:51:33.551751+00:00 | 1,531,261,296,000 | 93b9133ba095caa0d05bfdeb81c7705900237385 | 3 | {
"blob_id": "93b9133ba095caa0d05bfdeb81c7705900237385",
"branch_name": "refs/heads/master",
"committer_date": 1531261296000,
"content_id": "a20c3ba00c008ed5d87792ff548fe34380ddaa1c",
"detected_licenses": [
"MIT"
],
"directory_id": "c52fe0ec977a650aa80afbccc58bd5674d7e5d70",
"extension": "py",
"fi... | 2.75 | stackv2 | #!usr/bin/env python
"""
Basic use of SSL in the context of a regular cryptographic library
"""
import ssl
import socket
from pprint import pprint
HOSTNAME = "www.python.org"
context = ssl.create_default_context()
context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
context.verify_mode = ssl.CERT_REQUIRED
context.check_ho... | 22 | 23.59 | 85 | 9 | 129 | python | [{"finding_id": "codeql_py/insecure-protocol_15ed97e364be99e6_20c0b5fd", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
18
] | [
null
] | [
8
] | [
15
] | |
2024-11-18T20:51:45.692818+00:00 | 1,571,862,750,000 | accc7e50ccf9c4c2cad95a9e75db989ebaf233a5 | 4 | {
"blob_id": "accc7e50ccf9c4c2cad95a9e75db989ebaf233a5",
"branch_name": "refs/heads/master",
"committer_date": 1571862750000,
"content_id": "d564381fc398ab266a8171abd13cc518bd884f43",
"detected_licenses": [
"MIT"
],
"directory_id": "05d5b1530d3a8ebf8fc50b7f4b56b764c1044596",
"extension": "py",
"fi... | 3.71875 | stackv2 | #!/usr/bin/python3
from string import ascii_lowercase, ascii_uppercase, digits, punctuation
from numpy import dtype, fromiter
from numpy.random import choice, randint, shuffle
CHAR_ENCODING = dtype('U1')
INT_TYPE = dtype('uint8')
SYMBOLS = (
fromiter(ascii_lowercase, dtype=CHAR_ENCODING),
fromiter(ascii_upp... | 47 | 24.34 | 72 | 12 | 293 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ca94cc8558c00a03_f4347a28", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
47
] | [
null
] | [
11
] | [
30
] | |
2024-11-18T19:07:34.506523+00:00 | 1,616,181,303,000 | fc3633d2f13882169bba39084760321f35c82990 | 3 | {
"blob_id": "fc3633d2f13882169bba39084760321f35c82990",
"branch_name": "refs/heads/main",
"committer_date": 1616181303000,
"content_id": "a715627556d0b556740bca76f1076c1611dc9856",
"detected_licenses": [
"MIT"
],
"directory_id": "4ab7ee6d6a7d42010d8ea51863371d32c1d77b76",
"extension": "py",
"file... | 2.828125 | stackv2 | """
----------------------------------
Minas Katsiokalis
AM: 2011030054
email: minaskatsiokalis@gmail.com
----------------------------------
"""
import socket,ssl,pprint
#create a socket, set hostname = local_name, and port
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
host = socket.gethostname... | 38 | 26.63 | 67 | 8 | 257 | python | [{"finding_id": "codeql_py/insecure-protocol_d78eceb71d566a6e_53ac06cd", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
23
] | [
null
] | [
12
] | [
19
] | |
2024-11-18T19:07:48.015324+00:00 | 1,678,114,008,000 | 7b44be2e0d870b01f29c168ab906685a428a2896 | 3 | {
"blob_id": "7b44be2e0d870b01f29c168ab906685a428a2896",
"branch_name": "refs/heads/master",
"committer_date": 1678114008000,
"content_id": "0b62af9a05c061b027957d866862e8a44571df5d",
"detected_licenses": [
"MIT"
],
"directory_id": "f52b8606074c2e0cc0c60b30b51c015fd932b0a2",
"extension": "py",
"fi... | 2.703125 | stackv2 | from collections import OrderedDict
import yaml
from jinja2 import Environment, PackageLoader
from lxml import etree
from virl.helpers import get_node_mgmt_ip
def setup_yaml():
""" https://stackoverflow.com/a/8661021 """
represent_dict_order = lambda self, data: self.represent_mapping("tag:yaml.org,2002:map",... | 263 | 31.69 | 118 | 18 | 1,942 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d2844e8e8217b349_acb6b089", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
193,
207,
221
] | [
null,
null,
null
] | [
14,
14,
14
] | [
74,
74,
74
] | |
2024-11-18T19:07:54.099309+00:00 | 1,584,302,449,000 | f0d8ac1a8551b164bcc07f8028111aae0b0ce8d2 | 3 | {
"blob_id": "f0d8ac1a8551b164bcc07f8028111aae0b0ce8d2",
"branch_name": "refs/heads/master",
"committer_date": 1584302449000,
"content_id": "5fd4dcedc518b7516b8ce55ea138001f470c2e98",
"detected_licenses": [
"MIT"
],
"directory_id": "7f26c264463211695cc857c9927201d0560f3fc5",
"extension": "py",
"fi... | 2.640625 | stackv2 | from flask import Flask
from flask import url_for
from flask import json
from flask import request
from flask import abort
import doctors
import logging
app = Flask(__name__)
doc_data = doctors.DoctorData()
@app.route('/doctors', methods = ['GET'])
def api_doctors():
# Api que devuelve la lista de todos los terap... | 45 | 34.36 | 125 | 17 | 359 | python | [{"finding_id": "codeql_py/flask-debug_dfe19086b3179143_762e9150", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1)."
] | [
45,
34
] | [
null,
null
] | [
5,
29
] | [
24,
41
] | |
2024-11-18T19:08:00.084402+00:00 | 1,468,560,272,000 | 57a4e5473f40cbd2b1fb17152419e703c496c3b4 | 3 | {
"blob_id": "57a4e5473f40cbd2b1fb17152419e703c496c3b4",
"branch_name": "refs/heads/master",
"committer_date": 1468560272000,
"content_id": "7eab5dd45c9b3b2a70e796c916dc1c8870ffad25",
"detected_licenses": [
"MIT"
],
"directory_id": "540214282c30d9d53e9deffb837a39e7e736eece",
"extension": "py",
"fi... | 3.21875 | stackv2 | #!/usr/bin/env python
# -*- encoding: utf-8 -*-
"""
This file contains the code for working with links.
"""
import re
try:
from collections.abc import MutableSequence
except ImportError: # pragma: no cover
from collections import MutableSequence
# Regex for matching email addresses. This is taken from bir... | 150 | 32.58 | 79 | 20 | 1,222 | python | [{"finding_id": "codeql_py/redos_a4799ef5744f40b0_ffaa9151", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '!'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '!'."
] | [
48
] | [
null
] | [
11
] | [
22
] | |
2024-11-18T19:18:30.898303+00:00 | 1,598,576,872,000 | f364fd719b85fcc0e1d1cb218d93f7195b6b501e | 3 | {
"blob_id": "f364fd719b85fcc0e1d1cb218d93f7195b6b501e",
"branch_name": "refs/heads/master",
"committer_date": 1598576872000,
"content_id": "0cb3e22b02b2f655852fb2ce4608d9b114d7aec5",
"detected_licenses": [
"MIT"
],
"directory_id": "19571a766935df38c76e772cdda024b40d31dc1f",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python3
from optparse import OptionParser
import os
import os.path as path
import requests
import shutil
import sys
import tarfile
import urllib.request
import zipfile
current_version_url = 'https://www.drupal.org/download-latest/tar.gz'
home_directory = os.path.dirname(os.path.realpath(__file__))
temp_... | 138 | 32.41 | 100 | 18 | 991 | python | [{"finding_id": "codeql_py/tarslip_3ee7cb8c55b24e88_30a16062", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
82
] | [
null
] | [
5
] | [
12
] | |
2024-11-18T19:18:40.724812+00:00 | 1,516,863,293,000 | 250e07b722609770e6bf5fdc5856ae5f1c704c8e | 5 | {
"blob_id": "250e07b722609770e6bf5fdc5856ae5f1c704c8e",
"branch_name": "refs/heads/master",
"committer_date": 1516863293000,
"content_id": "7fd0066f4dc36bddd680a0329109a1ee6e31ea55",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d6bfde18dcf6cac32975438e90beca5216a14f68",
"extension": "py"... | 4.59375 | stackv2 | #18 사용자가 연봉과 결혼 여부를 입력하면 다음의
# 세금율에 의해 납부해야 할 세금을 계산하는 프로그램을 작성
salary = int(input('연봉을 입력하세요'))
isMarried = input('결혼여부를 입력하세요 (Y/N)')
tax=0
if isMarried.upper() == 'N':
if salary <3000 :
tax = salary * 0.1
else :
tax = salary * 0.25
else:
if salary :
tax= salary*0.1
else :
... | 114 | 21.98 | 59 | 11 | 1,253 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9ad10f613e19ff37_a01195f8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
17,
17
] | [
null,
null
] | [
17,
24
] | [
23,
27
] | |
2024-11-18T19:18:50.200542+00:00 | 1,473,838,865,000 | a227dafabbc96834e8bfda49f8b00be6bf95abd5 | 3 | {
"blob_id": "a227dafabbc96834e8bfda49f8b00be6bf95abd5",
"branch_name": "refs/heads/master",
"committer_date": 1473838865000,
"content_id": "9ad0132dd6b30b8fc4703b4a5603b56227c0c26a",
"detected_licenses": [
"MIT"
],
"directory_id": "e386c3b58815fc01d2ec3ba938e6fe6250638f53",
"extension": "py",
"fi... | 3.140625 | stackv2 | #! /usr/bin/env python3 -B
#
# Codice eseguibile per i capitoli del libro
# "Fondamenti di Programmazione in Python" di
# Fabio Pellacini
#
#
# Released under the MIT license
#
# Copyright (c) 2016 Fabio Pellacini
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software an... | 410 | 24.89 | 79 | 15 | 3,026 | python | [{"finding_id": "codeql_py/reflective-xss_6c5ef3b3f3344e1e_2922658e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 8 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scri... | [
355,
365,
372,
379,
386,
393,
400,
406
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
12,
12,
12,
12,
12,
12,
12,
12
] | [
24,
24,
24,
24,
24,
24,
24,
24
] | |
2024-11-18T19:19:03.563908+00:00 | 1,622,508,915,000 | 5b6d1ec30f17e2e06c0522195102cba86b0bc5a8 | 2 | {
"blob_id": "5b6d1ec30f17e2e06c0522195102cba86b0bc5a8",
"branch_name": "refs/heads/main",
"committer_date": 1622508915000,
"content_id": "eb236c1aa3f99c5caba7ad04c21292689f2e00ae",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b93fc62f02c43a6a8fceda4b0a1f66febfa35a27",
"extension": "py",
... | 2.46875 | stackv2 | from flask import Flask, request, render_template
from flask_restful import Resource, Api
import shutil
from keplergl import KeplerGl
import pandas as pd
import mysql.connector
import sys
from conf_rt import config
import re
import unicodedata
import nltk
from nltk.stem.porter import *
from nltk.corpus import stopword... | 143 | 30.74 | 114 | 13 | 1,197 | python | [{"finding_id": "codeql_py/flask-debug_e18329aef76f6325_d66aa392", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
143,
127
] | [
null,
null
] | [
5,
32
] | [
35,
37
] | |
2024-11-18T19:19:16.045567+00:00 | 1,526,659,451,000 | bad5a3cc9b073c54e54dbb5c2254be1ff733b8af | 2 | {
"blob_id": "bad5a3cc9b073c54e54dbb5c2254be1ff733b8af",
"branch_name": "refs/heads/master",
"committer_date": 1526659451000,
"content_id": "36af6774000122e49ac243fbe3d13d349182be27",
"detected_licenses": [
"MIT"
],
"directory_id": "6542528d3813442cfb19874898590054c48f8c59",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Xray API Module
"""
import os
import re
import base64
import logging
import json
import requests
from requests.auth import HTTPBasicAuth
from xraypy import xrayutils
__author__ = "João Galego"
__copyright__ = "João Galego"
__license__ = "mit"
LOGGER = logging.getLo... | 431 | 33.25 | 97 | 17 | 3,079 | python | [{"finding_id": "codeql_py/request-without-cert-validation_08a2593a003cc9cd_94f3dba5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
347,
395
] | [
351,
399
] | [
20,
20
] | [
47,
47
] | |
2024-11-18T19:29:42.113890+00:00 | 1,624,690,133,000 | 9feeb8eb138a493419152cbbe15708cf2f83f144 | 3 | {
"blob_id": "9feeb8eb138a493419152cbbe15708cf2f83f144",
"branch_name": "refs/heads/main",
"committer_date": 1624690133000,
"content_id": "5c084e63912f18c837d6d27de52eb0468b3312b5",
"detected_licenses": [
"MIT"
],
"directory_id": "95b7a68bc5106f02343c9741533634eaf8aa4ab7",
"extension": "py",
"file... | 2.578125 | stackv2 | """
main module which starts the application
"""
import os
import sys
import utils
import time
from json import load, dumps
from threading import Thread
from argparse import ArgumentParser
from flask import Flask, render_template, jsonify, make_response, request
from dbUtils import meta, addQuery, getAllQuery, setMoni... | 160 | 28.21 | 136 | 20 | 1,206 | python | [{"finding_id": "codeql_py/stack-trace-exposure_0637537203aaefa6_3fe6fe0c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
86,
160
] | [
null,
null
] | [
33,
2
] | [
53,
21
] | |
2024-11-18T19:44:23.044277+00:00 | 1,465,752,458,000 | 93ad74af013dc562ede14958b4d35a49a773b9eb | 2 | {
"blob_id": "93ad74af013dc562ede14958b4d35a49a773b9eb",
"branch_name": "refs/heads/master",
"committer_date": 1465752458000,
"content_id": "7b852f55b1ef0341959fc497edb95d819992e801",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6a5144b9aae890b825f0f5070cdc4064b312aaf1",
"extension": "py"... | 2.359375 | stackv2 | from flask import Flask, render_template, request
import urllib
import os
from flask import json
from rejseplanen import RejseplanClient, convertStops, convertDepartures
app = Flask(__name__)
baseurl = "http://xmlopen.rejseplanen.dk/bin/rest.exe"
rejseplanClient = RejseplanClient(baseurl)
apikey = 'AIzaSyCyOJLtB3rOMl... | 63 | 28.51 | 72 | 12 | 506 | python | [{"finding_id": "codeql_py/log-injection_8b5190e05beb5ddf_07dc9bd0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
30,
30,
48
] | [
null,
null,
null
] | [
45,
47,
35
] | [
46,
48,
44
] | |
2024-11-18T19:44:34.765095+00:00 | 1,469,431,585,000 | 2aca4f1cd485c5b4d5fb8e5d9c6ab8563f7b494f | 3 | {
"blob_id": "2aca4f1cd485c5b4d5fb8e5d9c6ab8563f7b494f",
"branch_name": "refs/heads/master",
"committer_date": 1469431585000,
"content_id": "e42bdb233f3c29af559bb3d5cd7382b9caa86dab",
"detected_licenses": [
"MIT"
],
"directory_id": "2b2502225fc6ff1bc2b5386d29f73c725431b792",
"extension": "py",
"fi... | 2.90625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import logging
import socket
import paramiko
LOG = logging.getLogger(__name__)
class SSHConnectException(Exception):
pass
class PasswordAuthException(Exception):
pass
def __new_sshclient():
client = paramiko.SSHClient()
client.load_system_host_keys(... | 113 | 33.45 | 89 | 13 | 824 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e7549d05dcf45ac0_bd8aaa68", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
23
] | [
null
] | [
5
] | [
65
] | |
2024-11-18T19:58:28.692880+00:00 | 1,481,751,192,000 | 218167b1ddfbff110cad81d05d80de0090ef6967 | 2 | {
"blob_id": "218167b1ddfbff110cad81d05d80de0090ef6967",
"branch_name": "refs/heads/master",
"committer_date": 1481751192000,
"content_id": "eb345bb99a011b6d4f08f09ad325bef15f982d5c",
"detected_licenses": [
"MIT"
],
"directory_id": "1a49e02f4f3923349b4434029343e3ef8c50838e",
"extension": "py",
"fi... | 2.359375 | stackv2 | import logging
from flask import Flask, request, abort, jsonify, make_response
from flask.ext.sqlalchemy import SQLAlchemy, DeclarativeMeta
from json import JSONEncoder
from sqlalchemy import *
import sys
import json
import os
import inspect
from sqlalchemy.dialects.postgresql import INTEGER, REAL, CHAR
import psycopg2... | 227 | 34.19 | 100 | 22 | 1,956 | python | [{"finding_id": "codeql_py/reflective-xss_9cffcf8e8ea43b93_7bcb64a8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
155
] | [
null
] | [
12
] | [
29
] | |
2024-11-18T20:10:26.992514+00:00 | 1,630,649,440,000 | 3250177c914aa84e2732b7803ec4a7fe4b9950a0 | 4 | {
"blob_id": "3250177c914aa84e2732b7803ec4a7fe4b9950a0",
"branch_name": "refs/heads/main",
"committer_date": 1630649440000,
"content_id": "72e06466e059ac37b52110e5cb1c916bec2ed4ea",
"detected_licenses": [
"MIT"
],
"directory_id": "bfbef414923883abc522dc064feafb730ce3b34c",
"extension": "py",
"file... | 3.8125 | stackv2 | work_hours = [('Abby',100),('Billy',400),('Cassie',800)]
def employee_check(work_hours):
current_max = 0
# Set some empty value before the loop
employee_of_month = ''
for employee,hours in work_hours:
if hours > current_max:
current_max = hours
employee_of_month... | 17 | 27.18 | 56 | 10 | 115 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f82935e37be69677_6d6f77ad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
17
] | [
null
] | [
7
] | [
33
] | |
2024-11-18T20:10:29.134457+00:00 | 1,634,234,655,000 | 4db1d02543604f032c312e868629b3bf7d1d63d5 | 2 | {
"blob_id": "4db1d02543604f032c312e868629b3bf7d1d63d5",
"branch_name": "refs/heads/main",
"committer_date": 1634234655000,
"content_id": "4f1e32d7c3834e5a0d70478240280f693e1dd952",
"detected_licenses": [
"MIT"
],
"directory_id": "48f8f48d6af29545d8dfde03de1dbad524b7034d",
"extension": "py",
"file... | 2.375 | stackv2 | from flask import Flask, send_file, request, render_template, redirect, url_for
from bson.objectid import ObjectId
import pymongo
import json
import image
import sys
from dotenv import load_dotenv
load_dotenv()
import os
mongolab_uri = os.environ.get("DATABASE_URI")
client = pymongo.MongoClient(mongolab_uri,
... | 74 | 25.95 | 136 | 13 | 471 | python | [{"finding_id": "codeql_py/flask-debug_4216fb820d5706fa_75481665", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
74,
70
] | [
null,
null
] | [
5,
22
] | [
24,
39
] | |
2024-11-18T20:23:10.780969+00:00 | 1,666,738,911,000 | 2d4344f309046e5d032ae08d13ed6bec316a3392 | 2 | {
"blob_id": "2d4344f309046e5d032ae08d13ed6bec316a3392",
"branch_name": "refs/heads/master",
"committer_date": 1666738911000,
"content_id": "2475a0cec8b55f2d74a042d4000acfb3f25167e7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a1657a0c5c8f3f8b51b98074293e2f2e9b16e6f4",
"extension": "py"... | 2.40625 | stackv2 | import logging
import os
import sys
import yaml
import json
from flask import request
from kubernetes import client
import datetime as dt
from . import api
# The backend will send the first config it will successfully load
CONFIGS = [
"/etc/config/spawner_ui_config.yaml",
"./kubeflow_jupyter/common/yaml/spawne... | 473 | 28.94 | 79 | 18 | 3,275 | python | [{"finding_id": "codeql_py/log-injection_5ab5642c04106e48_c6fd865d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
44
] | [
46
] | [
21
] | [
10
] | |
2024-11-18T20:23:17.361042+00:00 | 1,577,894,513,000 | 3edd597a31ec748b33f455fc8b879e87a5e03b20 | 3 | {
"blob_id": "3edd597a31ec748b33f455fc8b879e87a5e03b20",
"branch_name": "refs/heads/master",
"committer_date": 1577894513000,
"content_id": "86cb90434e08807caaf67e3f04a3b10ab2a57799",
"detected_licenses": [
"MIT"
],
"directory_id": "6b7f42ce6fa932f06d016d5966d310a54ce8e925",
"extension": "py",
"fi... | 2.984375 | stackv2 | from flask import Flask, escape, url_for, request, render_template
app = Flask(__name__)
# @app.route('/')
# def hello_world():
# return 'Hello, World!'
@app.route('/user/<username>')
def show_user_profile(username):
# show the user profile for that user
return 'User %s' % escape(username)
@app.route(... | 88 | 23.72 | 75 | 14 | 512 | python | [{"finding_id": "codeql_py/reflective-xss_5da00782388e927f_06f06a99", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
19
] | [
null
] | [
12
] | [
31
] | |
2024-11-18T20:49:39.975383+00:00 | 1,508,363,139,000 | 09f51a62c722441858e27ab50e391f176a8b8afc | 3 | {
"blob_id": "09f51a62c722441858e27ab50e391f176a8b8afc",
"branch_name": "refs/heads/master",
"committer_date": 1508363139000,
"content_id": "79a499cb1f829a22917bbefe6fa1c817e668488d",
"detected_licenses": [
"MIT"
],
"directory_id": "905071b9509f1a4aeb8318f6cfe3bd09e8c4bb59",
"extension": "py",
"fi... | 2.90625 | stackv2 | """Copyright 2017, Integrated Device Technologies, Inc.
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, pu... | 173 | 32.43 | 111 | 18 | 1,315 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ae715a9c3f38c59c_000f3c42", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
160
] | [
null
] | [
27
] | [
33
] | |
2024-11-18T20:50:08.598606+00:00 | 1,393,055,343,000 | 350686d4cf95024565608f19fb84243a08086ddb | 2 | {
"blob_id": "350686d4cf95024565608f19fb84243a08086ddb",
"branch_name": "refs/heads/master",
"committer_date": 1393055343000,
"content_id": "ba1741da3ebbb377f1c30ecd69659cb0261f4d76",
"detected_licenses": [
"MIT"
],
"directory_id": "81727133b05822826f734953f353e9e50f633482",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
import hashlib
import requests
import json
FLICKR_BASE = "http://api.flickr.com/services/rest/"
def api(method, **kwargs):
kwargs.update({
"method": "flickr.{}".format(method),
"format": "json",
"nojsoncallback": "1",
"api_key": os.environ["FLICKR_KEY"],
"auth_tok... | 22 | 28.32 | 82 | 14 | 170 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ba4d65ba86de2d55_dd99e482", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
19
] | [
null
] | [
37
] | [
70
] | |
2024-11-18T20:50:19.049057+00:00 | 1,415,311,169,000 | b5b72a661b5da7ed9af95c4aa80ae1e6804aa534 | 2 | {
"blob_id": "b5b72a661b5da7ed9af95c4aa80ae1e6804aa534",
"branch_name": "refs/heads/master",
"committer_date": 1415311169000,
"content_id": "830e9e6787c14761bfc16bf04b76ba69055e238d",
"detected_licenses": [
"MIT"
],
"directory_id": "a7a36774e55518a67b27eef3079d98554f08c59a",
"extension": "py",
"fi... | 2.5 | stackv2 | import os
import tempfile
import re
import bottle
import PIL.Image
import PIL.ImageDraw
import PIL.ImageFont
formats = {
'png': {
'format': 'PNG',
'mimetype': 'image/png'
},
'jpg': {
'format': 'JPEG',
'mimetype': 'image/jpeg'
},
'gif': {
'format': 'GIF',
... | 133 | 28.07 | 171 | 15 | 1,246 | python | [{"finding_id": "codeql_py/path-injection_491de823dffea3eb_4945c617", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
96
] | [
null
] | [
53
] | [
65
] | |
2024-11-18T20:50:43.127172+00:00 | 1,617,099,076,000 | aaaf48e6e1930b2bff77ff81888cfd633aed31f9 | 3 | {
"blob_id": "aaaf48e6e1930b2bff77ff81888cfd633aed31f9",
"branch_name": "refs/heads/main",
"committer_date": 1617099076000,
"content_id": "1f8b79db25f83f521e5627e47e28f4822b1fa871",
"detected_licenses": [
"MIT"
],
"directory_id": "12cb7f289d6d81011a03fb7d5c74936a5e301423",
"extension": "py",
"file... | 2.859375 | stackv2 | """Routes for the course resource.
"""
import json
from flask import current_app as app
from flask import request, redirect, render_template, make_response, jsonify
from http import HTTPStatus
from datetime import datetime as dt
from sqlalchemy import or_, and_, not_
import data
from models.database import db
from mo... | 267 | 33.3 | 93 | 15 | 1,900 | python | [{"finding_id": "codeql_py/stack-trace-exposure_77708910059a186c_83d2d6a2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
172,
230,
264
] | [
null,
null,
null
] | [
38,
38,
38
] | [
42,
42,
42
] | |
2024-11-18T20:50:57.461258+00:00 | 1,522,862,610,000 | 5856009005ff2e71028d7bc7c05d3d6e0bcab520 | 2 | {
"blob_id": "5856009005ff2e71028d7bc7c05d3d6e0bcab520",
"branch_name": "refs/heads/master",
"committer_date": 1522862610000,
"content_id": "ead5f8506b70b6d3404b81fb5d9a44c964cbaabf",
"detected_licenses": [
"MIT"
],
"directory_id": "2e1f88208e3f80dbd76ef20992908636ca7f362b",
"extension": "py",
"fi... | 2.359375 | stackv2 | import os
import json
import db_utils as db
import tweepy as tp
import flask
import uuid
import html
import urllib
from functools import wraps
from datetime import datetime
import streaming
os.chdir(os.path.dirname(os.path.abspath(__file__)))
ErrorMessage = {
"-1": "不明なエラーが発生しました。",
"101": "メモの詳細取得に失敗しました。",
... | 283 | 31.78 | 135 | 21 | 2,471 | python | [{"finding_id": "codeql_py/insecure-cookie_59750cb3e30a5f8f_abc9a7a3", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 6 | true | [
"CWE-614",
"CWE-614",
"CWE-312",
"CWE-1004",
"CWE-1004",
"CWE-022"
] | [
"py/insecure-cookie",
"py/insecure-cookie",
"py/clear-text-storage-sensitive-data",
"py/client-exposed-cookie",
"py/client-exposed-cookie",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is added to response without the 'secure' flag being set.",
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.",
"Sensitive server cookie is set with... | [
129,
137,
129,
129,
137,
228
] | [
null,
null,
null,
null,
null,
null
] | [
5,
5,
35,
5,
5,
19
] | [
63,
49,
62,
63,
49,
56
] | |
2024-11-18T21:13:57.407752+00:00 | 1,600,055,057,000 | 5643783b4cf6cfd0834da30717c5237ed9e346e6 | 2 | {
"blob_id": "5643783b4cf6cfd0834da30717c5237ed9e346e6",
"branch_name": "refs/heads/master",
"committer_date": 1600055057000,
"content_id": "5393d02735d24a2839f279f5a3df7174e6309351",
"detected_licenses": [
"MIT"
],
"directory_id": "29c6c54ab679fb2462e29212c75066e9d1940501",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, Blueprint, request, jsonify, make_response
from werkzeug.security import generate_password_hash, check_password_hash
from db import db_connect
from auth import require_auth_token
import datetime
import jwt
import psycopg2
import sys
deposits = Blueprint('deposits', __name__)
@ deposits.route... | 65 | 41.43 | 164 | 16 | 645 | python | [{"finding_id": "codeql_py/stack-trace-exposure_12ea745f2f3f56f5_41212457", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
27,
43,
65
] | [
null,
null,
null
] | [
16,
16,
16
] | [
90,
97,
106
] | |
2024-11-18T21:13:59.426093+00:00 | 1,510,042,834,000 | 85a971e8189fd6e1d180893d5058d0c6342618af | 2 | {
"blob_id": "85a971e8189fd6e1d180893d5058d0c6342618af",
"branch_name": "refs/heads/master",
"committer_date": 1510042834000,
"content_id": "fd041b1e2418f0544f4f3e678e593f12f7622f74",
"detected_licenses": [
"MIT"
],
"directory_id": "d00fd11ed937c7fe5b773e87ece54250bb4c3c0b",
"extension": "py",
"fi... | 2.3125 | stackv2 | from __init__ import db, models, login_manager, app
from flask import redirect, url_for, request, render_template
from flask_admin import expose, helpers
from flask_admin import Admin, AdminIndexView
from flask_admin.contrib.sqla import ModelView
from forms import LoginForm, submit_ep_form
import helpers as my_helpers
... | 161 | 51.35 | 145 | 25 | 1,702 | python | [{"finding_id": "codeql_py/path-injection_364793342b8be893_ff6ae370", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
79
] | [
null
] | [
37
] | [
51
] | |
2024-11-18T21:13:59.841015+00:00 | 1,626,587,998,000 | 3a51f873ec92801bb79a43d80902656323d90c9e | 2 | {
"blob_id": "3a51f873ec92801bb79a43d80902656323d90c9e",
"branch_name": "refs/heads/master",
"committer_date": 1626587998000,
"content_id": "334f86ad943e41933ae0339123870b4c478866f5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "06b35f7427ff8b2130fe3c1a7cfca781890e23ac",
"extension": "py"... | 2.46875 | stackv2 | '''
Created on 05-Feb-2021
@author: Abhishek Prajapati
'''
from os import path
from jinja2 import Environment, FileSystemLoader
from managers.vars_manager import AppsVars
from pyexception.RazorException import RazorException
from razorpy_abstract.RazorPy import RazorPy
import ntpath
class Template(RazorPy):
''... | 94 | 27.73 | 140 | 20 | 552 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f73fcbf817babf60_757f2c9d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
71,
88
] | [
null,
null
] | [
19,
19
] | [
50,
50
] | |
2024-11-18T21:14:01.686406+00:00 | 1,611,104,375,000 | 2efce0458f87a1706f4f1d0904ab5521666b1428 | 2 | {
"blob_id": "2efce0458f87a1706f4f1d0904ab5521666b1428",
"branch_name": "refs/heads/master",
"committer_date": 1611104375000,
"content_id": "6f2f7222a7fe88435b9e0441c375bef5b3ca01e5",
"detected_licenses": [
"MIT"
],
"directory_id": "1e94439a8db204d703cfeaae3ab69aa005ea059d",
"extension": "py",
"fi... | 2.4375 | stackv2 | import uuid
from tornado.websocket import WebSocketHandler, WebSocketClosedError
import logging
import json
logger = logging.getLogger(__name__)
class FarCameraFeedWS(WebSocketHandler):
"""
watchers is a class level array, anyone connecting shares the same array
"""
watchers = set()
def open(self):... | 44 | 30.02 | 76 | 15 | 279 | python | [{"finding_id": "codeql_py/log-injection_a9d3248452c9abae_b10d3f1d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
25
] | [
32
] | |
2024-11-18T21:14:08.560027+00:00 | 1,625,038,382,000 | e6fccf83e9e4f1c008f9b8f8de1a39bb88afe08b | 3 | {
"blob_id": "e6fccf83e9e4f1c008f9b8f8de1a39bb88afe08b",
"branch_name": "refs/heads/main",
"committer_date": 1625038426000,
"content_id": "62ebf3ba8f42b8ca3df2406119dd393d33c6c682",
"detected_licenses": [
"MIT"
],
"directory_id": "f723d0e2d3e4557578dbfc2f6d625e736a2c13df",
"extension": "py",
"file... | 3.390625 | stackv2 | """Обнаружение структуры во входном файле"""
import re
NAME_STR = 'Name *= *[A-Za-z0-9_,\(\)\+]+\n'
VALUES_STR = 'Values *= *\[(\S+, *)*\S+\]\n'
VALUE = '[^\s,]+'
FUNCTION = '[A-Za-z0-9_]+ *\\{[^\\}]+\\}'
SENTENCE_STR = '[^\n]+=[^;]+'
class ParsingException(ValueError):
"""Вызывается, когда во входном файле нах... | 80 | 33.39 | 121 | 29 | 690 | python | [{"finding_id": "codeql_py/redos_a5fd5a51a7c12399_b42e7223", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'Values=\\[' and containing many r... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'Values=\\[' and containing many repetitions of '!,'."
] | [
6
] | [
null
] | [
29
] | [
32
] | |
2024-11-18T21:14:10.591597+00:00 | 1,661,133,207,000 | 2c3c8c878631bde9469d9dcf8c4494cf2d3c9a8e | 2 | {
"blob_id": "2c3c8c878631bde9469d9dcf8c4494cf2d3c9a8e",
"branch_name": "refs/heads/master",
"committer_date": 1661133207000,
"content_id": "8f1241f24eac2f7c94e0b40ff9e875a112d60c6e",
"detected_licenses": [
"MIT"
],
"directory_id": "4f81b519e5d48106cdcdb099e5660c21911b1287",
"extension": "py",
"fi... | 2.375 | stackv2 | import requests
import datetime
import threading
import json
import os
import pandas as pd
import numpy as np
import time
import sqlite3
from configparser import ConfigParser
from requests.packages.urllib3.exceptions import InsecureRequestWarning
from requests_toolbelt.multipart.encoder import MultipartEncoder
from con... | 160 | 29.37 | 115 | 24 | 1,448 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1116672ea2fe77d2_4a6dc7a3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
66
] | [
71
] | [
14
] | [
5
] | |
2024-11-18T21:14:16.686179+00:00 | 1,518,133,705,000 | 07cef49054bd8ced69ad6cd19e73f4d5990fc68b | 3 | {
"blob_id": "07cef49054bd8ced69ad6cd19e73f4d5990fc68b",
"branch_name": "refs/heads/master",
"committer_date": 1518133705000,
"content_id": "24f673225af43b708244412033de0c6ad92c58a5",
"detected_licenses": [
"MIT"
],
"directory_id": "2b52723838481e3ef6f8ba20326487dc4086e93b",
"extension": "py",
"fi... | 3.078125 | stackv2 | from flask import Flask, request, redirect, render_template
import cgi
import os
#boilerplate language to call templates
app = Flask(__name__)
app.config['DEBUG'] = True
@app.route("/")
def index():
return render_template('hello_form.html')
@app.route("/hello", methods=["POST"])
def hello():
first_n... | 97 | 25.85 | 105 | 13 | 589 | python | [{"finding_id": "codeql_py/reflective-xss_e697c3f855fb2468_aa281bc1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
81
] | [
null
] | [
12
] | [
90
] | |
2024-11-18T21:14:22.565228+00:00 | 1,600,906,792,000 | 4b0de28f77fa82b04e4ef36319723a79cc355d9a | 3 | {
"blob_id": "4b0de28f77fa82b04e4ef36319723a79cc355d9a",
"branch_name": "refs/heads/master",
"committer_date": 1600906792000,
"content_id": "14bd146ac38ab234e05bfde91ec99cbeec3200e3",
"detected_licenses": [
"MIT"
],
"directory_id": "953c95de4b730ee28227117da5aee49fcac56af2",
"extension": "py",
"fi... | 3.1875 | stackv2 | print("Welcome to Startin Dev Web Campus!\n\nPlease sign up\n")
username1 = input("Enter your dumb username: ")
email1 = input("Enter your childish email: ")
password1 = input("Enter your easy hackable password: ")
print("\nSuccessfully registration\nNow please login for God´s sake\n")
usernameOrEmail = input("Pleas... | 28 | 37.5 | 110 | 13 | 256 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_66fef7a6d42457d6_dd40ccb8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
13,
19
] | [
null,
null
] | [
11,
11
] | [
19,
19
] | |
2024-11-18T21:14:26.856168+00:00 | 1,654,261,519,000 | 5844d95660beb7890b1683a0c6d417963fbd75fc | 3 | {
"blob_id": "5844d95660beb7890b1683a0c6d417963fbd75fc",
"branch_name": "refs/heads/master",
"committer_date": 1654261519000,
"content_id": "908dc5ce981e7fbf3a53cf12af9b275a3c36d404",
"detected_licenses": [
"MIT"
],
"directory_id": "bee20f811ff64b58f6810bb100147bc4aea9b5a2",
"extension": "py",
"fi... | 2.984375 | stackv2 | import os
import csv
import chardet
from random import SystemRandom
from string import ascii_uppercase, digits
from django.conf import settings
from django.contrib.auth import get_user_model
from django.db import IntegrityError
from django.core.management.base import BaseCommand, CommandError
from system.models import ... | 198 | 29.64 | 79 | 26 | 1,203 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c7fdcb273c9ff508_126c1554", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
51
] | [
null
] | [
20
] | [
63
] | |
2024-11-18T20:48:04.972335+00:00 | 1,591,205,268,000 | f75b0d2801155825d0251098fca7ea532495bb38 | 3 | {
"blob_id": "f75b0d2801155825d0251098fca7ea532495bb38",
"branch_name": "refs/heads/master",
"committer_date": 1591205268000,
"content_id": "c0faf3c4cdae1cf010d6dfee08970342c681fc45",
"detected_licenses": [
"MIT"
],
"directory_id": "63e45564812432d93f4d6acf02f85ef25183b2ad",
"extension": "py",
"fi... | 2.78125 | stackv2 | import pandas as pd
from pandas import DataFrame
# from arcgis.gis import GIS
# from arcgis import geocoding
import googlemaps
import ssl
import os
def arcgis_geocode(df: DataFrame, arcgis_user: str, arcgis_pass: str):
ssl._create_default_https_context = ssl._create_unverified_context
arcgis_user = arcgis_user... | 80 | 35.25 | 97 | 15 | 789 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3bebd92ee0ea7a1e_3621a23e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
70
] | [
null
] | [
11
] | [
25
] | |
2024-11-18T20:48:10.997189+00:00 | 1,691,687,076,000 | b986ee273959d95e9833121913d3496fa575061a | 3 | {
"blob_id": "b986ee273959d95e9833121913d3496fa575061a",
"branch_name": "refs/heads/master",
"committer_date": 1691687076000,
"content_id": "37745c776370039f43594e28c519572ae0865e3f",
"detected_licenses": [
"MIT"
],
"directory_id": "98d9a43778d2d0eebe3820ab3dfd0ceb488e204d",
"extension": "py",
"fi... | 2.625 | stackv2 | import os
from typing import Set, Tuple, Union
import requests
from dxf import DXF
from dockerscan import DockerscanNotExitsError, DockerscanError
def _get_digest_by_tag(registry: str,
remote_image_name: str,
tag: str) -> str:
insecure, registry_without_schema = _ge... | 145 | 29.07 | 87 | 13 | 924 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ac75528339d98d56_1664893a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
42
] | [
45
] | [
9
] | [
35
] | |
2024-11-18T20:48:20.280346+00:00 | 1,543,565,808,000 | 85137c8e773380d2a75a9481f083d80d4ec20f8f | 2 | {
"blob_id": "85137c8e773380d2a75a9481f083d80d4ec20f8f",
"branch_name": "refs/heads/master",
"committer_date": 1543565808000,
"content_id": "ec47c5217dd36a72c386eeac8febe5c1fe4e4053",
"detected_licenses": [
"MIT"
],
"directory_id": "9584db019d5555ab386c921032eadfc74eb461e3",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!usr//bin/env python3
import json
import hashlib
from suds.client import Client
from xml.sax.saxutils import escape
def gettext(username, password):
url = 'http://114.55.172.147:9701/MemberService.asmx?wsdl'
client = Client(url)
m = hashlib.md5(password.encode('utf-8'))
pswd = m.hexdigest()
print... | 28 | 19.89 | 82 | 11 | 175 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_992a475ccea72041_75688d47", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
11
] | [
null
] | [
21
] | [
45
] | |
2024-11-18T21:11:32.813140+00:00 | 1,626,748,235,000 | 0c88187c4601a91cf8216145d6208fcb5bd2d224 | 2 | {
"blob_id": "0c88187c4601a91cf8216145d6208fcb5bd2d224",
"branch_name": "refs/heads/main",
"committer_date": 1626748235000,
"content_id": "d84897b0fa7137919b0f229ec20161d1a80a3576",
"detected_licenses": [
"MIT"
],
"directory_id": "b10f92bf58b91f856b8d85c36b6d37d971c9422a",
"extension": "py",
"file... | 2.390625 | stackv2 | from __future__ import annotations
from email import message
import os
import logging
from typing import Optional
from datetime import datetime, timedelta
from fastapi import FastAPI
from fastapi.responses import PlainTextResponse
from pydantic import BaseModel
from enum import Enum, IntEnum
from trident_mcc.models ... | 99 | 28.34 | 87 | 15 | 660 | python | [{"finding_id": "codeql_py/log-injection_71be71a6b8ab17f7_d58ca6a8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
79
] | [
null
] | [
9
] | [
82
] | |
2024-11-18T21:11:40.341824+00:00 | 1,509,611,786,000 | 57e01bff6d75c83196cf230be1f6947ca500cb13 | 2 | {
"blob_id": "57e01bff6d75c83196cf230be1f6947ca500cb13",
"branch_name": "refs/heads/master",
"committer_date": 1509611786000,
"content_id": "69d3aa41f9539a641ccc9799d00929070a280db1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ec17eada02ee0254560f22b3fc3a75cb35dbb1c7",
"extension": "py"... | 2.390625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
'''
####################################
#
# Ingestion API Front-end
#
####################################
We provide:
|---------------------------------------|-----------------|----------------|
| endpoint | accepted method | Note ... | 170 | 35.02 | 105 | 15 | 1,379 | python | [{"finding_id": "codeql_py/log-injection_58cf89f6968c13aa_00d8b56a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
68,
83
] | [
null,
null
] | [
14,
14
] | [
51,
49
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.