added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T19:24:05.163373+00:00
1,630,247,757,000
7ef66a3bf44d9e133b68704b4e573dce0cd9ae97
3
{ "blob_id": "7ef66a3bf44d9e133b68704b4e573dce0cd9ae97", "branch_name": "refs/heads/main", "committer_date": 1630247757000, "content_id": "ceb2784f2592b4bc2efbcf815be8bb8fa66e9fff", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5f0d45d34fe6fb2aef9cf7cc5f19ab82dae8d761", "extension": "py", ...
3.078125
stackv2
""" Nitro Enclave and Attestation integration with KMS Sample """ import base64 import json import socket from Crypto.Cipher import AES from kms import NitroKms ENCLAVE_PORT = 5000 """Client-side AES encryption""" def add_to_16(value): while len(value) % 16 != 0: value += '\0' return str.encode(valu...
109
39.07
123
16
1,057
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_a5516ba9df7fa68e_496a32ec", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 21, 29 ]
[ null, null ]
[ 19, 26 ]
[ 47, 55 ]
2024-11-18T19:58:18.429428+00:00
1,620,333,344,000
f77ee433b3e6a62302d092d43bedcd43d3e361e5
3
{ "blob_id": "f77ee433b3e6a62302d092d43bedcd43d3e361e5", "branch_name": "refs/heads/master", "committer_date": 1620333344000, "content_id": "329aeb9ee7e2955eccf868869506912a5901c761", "detected_licenses": [ "MIT" ], "directory_id": "98e15084f6103425372690a42cdffee46f3bdb8a", "extension": "py", "fi...
2.609375
stackv2
import json import logging import os import re import stat from cryptography.fernet import Fernet # Module default logger logger = logging.getLogger(__name__) class SecureStorage: NAME_PATTERN = re.compile(r"^[\w][\w-]*$") NS_PATTERN = re.compile(r"^(?:\.|[\w][\w-]*)(?:/[\w][\w-]*)*$") @staticmethod ...
96
36.55
96
17
764
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_35089cd3ae79f6fc_4102c52f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text." ]
[ 82 ]
[ null ]
[ 24 ]
[ 41 ]
2024-11-18T19:58:21.778073+00:00
1,420,617,659,000
15f86f6ed00b915fe33177006a65db0fbbdc1fc8
2
{ "blob_id": "15f86f6ed00b915fe33177006a65db0fbbdc1fc8", "branch_name": "refs/heads/master", "committer_date": 1420617659000, "content_id": "0fd5b87af19677c5a713b166ffbd41bc6ebb9e8e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "58b63d2afc9468e045b36aac5e3ec8cf80f1bf29", "extension": "py"...
2.3125
stackv2
# coding: utf-8 # # Copyright (c) Alexandr Emelin. BSD license. # All rights reserved. # import tornado.gen import tornado.web import tornado.httpclient import json import os from urllib.parse import urlencode, parse_qsl def hostname(): # self # return 'http://127.0.0.1:9430/' # heroku return 'http:...
148
28.21
79
21
971
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c817682a82acdf88_196d8816", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 101 ]
[ null ]
[ 51 ]
[ 66 ]
2024-11-18T18:39:27.972416+00:00
1,599,369,800,000
d68e91f746df474780c799c7632292aea472c35c
3
{ "blob_id": "d68e91f746df474780c799c7632292aea472c35c", "branch_name": "refs/heads/master", "committer_date": 1599369800000, "content_id": "382435c0c9ac4d2c0ee8115741401a76bf78a17b", "detected_licenses": [ "MIT" ], "directory_id": "f1578c69df2b3a38fe23d0d979c5d8ef07d93c4e", "extension": "py", "fi...
2.703125
stackv2
"""Core Appliction. This module houses the core Flask application. """ import os import json import logging import boto3.session import watchtower from flask import Flask, g, request from datetime import datetime from flask_restful import Api from matching.api import ComputeMatch from matching.config import Configura...
92
34.34
115
13
721
python
[{"finding_id": "codeql_py/log-injection_a281f9f2ef4e7af5_d38736ef", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 70, 72 ]
[ null, null ]
[ 21, 22 ]
[ 25, 26 ]
2024-11-18T18:39:28.793915+00:00
1,411,161,588,000
08f3f4f19217e082d6b34139d7a7aff608db7e9e
3
{ "blob_id": "08f3f4f19217e082d6b34139d7a7aff608db7e9e", "branch_name": "refs/heads/master", "committer_date": 1411161588000, "content_id": "c7065c354485e931e529b89ca64c88af81a13a22", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "b38c8ec67ceeb5672bba862d91fb58d789f7f100", "extension": "p...
3.0625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import sys import Crypto.Random from Crypto.Cipher import AES import hashlib import msgpack import zlib import cPickle as pickle __all__ = ["encrypt", "decrypt"] # Salt size in bytes SALT_SIZE = 32 # Number of iterations in the key generation NUMBER_OF_ITERATIONS = 20 ...
73
27.47
88
12
520
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_7478c62c4982551f_430042ab", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 54, 65 ]
[ null, null ]
[ 18, 28 ]
[ 50, 64 ]
2024-11-18T18:40:06.298420+00:00
1,541,791,605,000
b5f154f1aeee1b89585e11c5e90c8ec0da98edc2
3
{ "blob_id": "b5f154f1aeee1b89585e11c5e90c8ec0da98edc2", "branch_name": "refs/heads/master", "committer_date": 1541792392000, "content_id": "66038906d33cb54337c115adbeaf995bd2d1ba73", "detected_licenses": [ "MIT" ], "directory_id": "4677d62e020cdfdcd4e641dde7564b4fef542640", "extension": "py", "fi...
2.828125
stackv2
"""Code for scraping from mamahd.""" import logging import multiprocessing as mp import socket import time import requests from bs4 import BeautifulSoup from streamscrape.utils import get_ip_address logger = logging.getLogger(__name__) HOME = "https://www.mamahd.org" def _scrape_event(url): """Scrape a specif...
79
28.75
81
21
528
python
[{"finding_id": "codeql_py/request-without-cert-validation_309a9a3e30144752_a8017551", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 26 ]
[ null ]
[ 12 ]
[ 43 ]
2024-11-18T20:52:22.339396+00:00
1,537,900,954,000
b470e29405ac9c8afb65c84ca9b320cb84cd369d
3
{ "blob_id": "b470e29405ac9c8afb65c84ca9b320cb84cd369d", "branch_name": "refs/heads/master", "committer_date": 1537900954000, "content_id": "bcccbd4f16fdd3cd4229221667ae1b55fcab8749", "detected_licenses": [ "MIT" ], "directory_id": "c0fea19a17ac82c3ac5fff9c76a488c2d9088130", "extension": "py", "fi...
2.765625
stackv2
import mutagen import json import ntpath import urllib.request import urllib import requests import tkinter from tkinter import filedialog import os apiKey = "9a3fd8b910073e56b47d0c4ddbdd984a" def getFile(): root = tkinter.Tk() root.withdraw() #use to hide tkinter window startDir = "::{20D04FE0-3AEA-1069...
94
31.27
89
19
812
python
[{"finding_id": "codeql_py/overly-permissive-file_d462060f7d448101_50f4aa17", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 76 ]
[ null ]
[ 5 ]
[ 29 ]
2024-11-18T20:52:25.497995+00:00
1,688,142,598,000
1fcf1da718d6fde5bfa9f7b18fa652e11d89e9db
2
{ "blob_id": "1fcf1da718d6fde5bfa9f7b18fa652e11d89e9db", "branch_name": "refs/heads/main", "committer_date": 1688142598000, "content_id": "99987b7702b69821dbd8c0b8400ec2b8354d8100", "detected_licenses": [ "MIT" ], "directory_id": "06cb7dc8d34b13de8c3ab617089a986ce91d9510", "extension": "py", "file...
2.4375
stackv2
""" Implements auth methods """ from .err import OperationalError try: from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import serialization, hashes from cryptography.hazmat.primitives.asymmetric import padding _have_cryptography = True except ImportError: ...
267
26.78
129
15
1,984
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bc3426f4e8ce45d9_eadfb0c4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 88, 199 ]
[ null, null ]
[ 24, 25 ]
[ 32, 33 ]
2024-11-18T19:49:10.709418+00:00
1,619,723,464,000
ab21c5345127751b6dc2ee441e9a0e2315c4008e
4
{ "blob_id": "ab21c5345127751b6dc2ee441e9a0e2315c4008e", "branch_name": "refs/heads/main", "committer_date": 1619723464000, "content_id": "bb925a51731c14936eff3bc148967ecec6438fa6", "detected_licenses": [ "MIT" ], "directory_id": "444dac2675b47446222d2d3c2e78d4cf9e8d5daf", "extension": "py", "file...
3.875
stackv2
# jogo de Forca secreta = 'parangaricutirrimirruaro' digitados = [] chance = 15 while True: if chance <= 0: print(f'Você tentou {chance} e perdeu!') break letra = input('Digite uma letra: ') if len(letra) > 1: print('Digite apenas uma letra.!!') continue digitados.appen...
35
29.29
86
12
302
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3353bc6cd2373d0f_13b1912f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a...
[ 28, 31 ]
[ null, null ]
[ 15, 15 ]
[ 86, 68 ]
2024-11-18T19:49:16.566722+00:00
1,485,295,299,000
373f4aa5b535ce57ebe76fedf78ca8a437f71f51
2
{ "blob_id": "373f4aa5b535ce57ebe76fedf78ca8a437f71f51", "branch_name": "refs/heads/master", "committer_date": 1485295299000, "content_id": "b92a78b673f18797b8a8854b5b738c55a7367d92", "detected_licenses": [ "MIT" ], "directory_id": "44f6db4962ff30d21bf449d03f9a7c6d35411a24", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python # encoding: utf-8 import praw import argparse import urllib import os from imguralbum import * import re def is_valid(thing): # Could make this a single boolean statement # but that's a maintenance nightmare. if not thing.is_self: if thing.over_18 and args.no_nsfw: ...
163
33.41
122
16
1,323
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fa98edd6ad95db45_b26902c5", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com](1) may be at an arbitrary position in the s...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [imgur.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 19 ]
[ null ]
[ 12 ]
[ 36 ]
2024-11-18T20:15:50.353789+00:00
1,643,001,480,000
b1ef3a1416ea80bc9fe363cedbb90da88999196a
3
{ "blob_id": "b1ef3a1416ea80bc9fe363cedbb90da88999196a", "branch_name": "refs/heads/master", "committer_date": 1643001480000, "content_id": "422dc455d46fb46666af5af4001085984524c541", "detected_licenses": [ "MIT" ], "directory_id": "97ed7b9099c01f0ea4744db40c2178606ccfcf77", "extension": "py", "fi...
2.65625
stackv2
# -*- coding: utf-8 -*- """ fileparser ~~~~~~~~~~ parse SQL file making use of special comments that defines dependencies & variables... :copyright: (c) 2014 by sc AmvTek srl :email: devel@amvtek.com """ import re from os.path import abspath from jinja2 import Environment # see PyPI jinja2 ...
127
26.74
77
15
847
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_65cc9c065a17d6e3_12a46022", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 119 ]
[ null ]
[ 14 ]
[ 54 ]
2024-11-18T20:15:51.410093+00:00
1,596,003,947,000
cf9664d376e1c6ad00148d6b08dc70554e621dab
3
{ "blob_id": "cf9664d376e1c6ad00148d6b08dc70554e621dab", "branch_name": "refs/heads/master", "committer_date": 1596003947000, "content_id": "1f8616a7a0f0f9920b1e7dee49c54953278e7256", "detected_licenses": [ "MIT" ], "directory_id": "a1d7739ddf09654f6b6f3e2266309cfb3efb45a2", "extension": "py", "fi...
2.8125
stackv2
from flask import Flask, redirect, url_for, request, jsonify from firebase_admin import credentials, firestore, initialize_app import json app = Flask(__name__) cred = credentials.Certificate('key.json') default_app = initialize_app(cred) db = firestore.client() patient_details = db.collection('patient_details') me...
173
30.58
122
15
1,228
python
[{"finding_id": "codeql_py/flask-debug_249ecc33050139a5_db8d2421", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
6
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 173, 66, 88, 113, 138, 157 ]
[ null, null, null, null, null, null ]
[ 5, 16, 16, 16, 16, 16 ]
[ 24, 20, 20, 20, 20, 20 ]
2024-11-18T20:15:54.592245+00:00
1,531,375,923,000
ff0ba688e2a10d923a67bb5673faea210d8a402a
3
{ "blob_id": "ff0ba688e2a10d923a67bb5673faea210d8a402a", "branch_name": "refs/heads/master", "committer_date": 1531375923000, "content_id": "72c12d20ee26237cc97edaebfb97d01e3a81cc0a", "detected_licenses": [ "MIT" ], "directory_id": "039079c36db45e57e21d61f8c69376e182a175e5", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/python3 import serial import time from datetime import datetime import os import logging import paramiko import traceback from config import ConsoleConfig from common import utc_str class Console: def __init__(self): self.iteration = 0 self.logfile = 'console.log' # TODO: Make this per ...
133
30.49
114
21
909
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_d02d939fcbbd8579_c13cca80", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
3
true
[ "CWE-295", "CWE-312", "CWE-312" ]
[ "py/paramiko-missing-host-key-validation", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 91, 54, 69 ]
[ null, null, null ]
[ 9, 23, 30 ]
[ 74, 45, 80 ]
2024-11-18T19:38:03.351735+00:00
1,421,697,521,000
b5c8fcb562c76e28fdcf121bbb0496fd9ceece23
2
{ "blob_id": "b5c8fcb562c76e28fdcf121bbb0496fd9ceece23", "branch_name": "refs/heads/master", "committer_date": 1421697521000, "content_id": "a3898923c9fcaad18c5b2d1101fc60aba0e833ca", "detected_licenses": [ "MIT" ], "directory_id": "a93153ba99748acbb0ced2730a49dd60948de6d2", "extension": "py", "fi...
2.40625
stackv2
import ferbuy import random from flask import Flask from flask import request from flask import render_template app = Flask(__name__) ferbuy.site_id = 1000 ferbuy.secret = 'your_secret' ferbuy.env = 'demo' @app.route('/') def redirect(): data = { 'reference': 'Transaction{0}'.format(random.randint(10000...
50
27.36
75
13
363
python
[{"finding_id": "codeql_py/flask-debug_ab29b0b30b6b4708_d0350ec1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 50, 46 ]
[ null, 47 ]
[ 5, 12 ]
[ 40, 52 ]
2024-11-18T19:38:41.971217+00:00
1,530,275,987,000
3ec8bac65183b3cccce9ccb8870e277cb3c0a745
3
{ "blob_id": "3ec8bac65183b3cccce9ccb8870e277cb3c0a745", "branch_name": "refs/heads/master", "committer_date": 1530275987000, "content_id": "009e7174900055474f5a3374549caec2729a994e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fe747dcc17d3890e90046489a56d7f0fc88624a3", "extension": "py"...
2.5625
stackv2
#!/usr/bin/env python from __future__ import unicode_literals import requests import logging import sys import urllib import StringIO import pycurl import json import time # setup logging logging.basicConfig(stream=sys.stdout,level = logging.DEBUG) logger = logging.getLogger(__name__) class SSLLabsAPI(): """ ...
152
36.82
171
20
1,275
python
[{"finding_id": "codeql_py/request-without-cert-validation_b241d0418903f43c_1040cd99", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 49, 51 ]
[ null, null ]
[ 28, 29 ]
[ 117, 97 ]
2024-11-18T20:10:35.804180+00:00
1,517,514,106,000
89cf69913f7aee92bdb41895dd6805749f401b95
3
{ "blob_id": "89cf69913f7aee92bdb41895dd6805749f401b95", "branch_name": "refs/heads/master", "committer_date": 1517514106000, "content_id": "1465e7c4208155d176e4802f83ebd8f1dea85428", "detected_licenses": [ "MIT" ], "directory_id": "1aefb8c1ca02c00a7693f553a842b0791204f3ef", "extension": "py", "fi...
3.296875
stackv2
from flask import Flask import MySQLdb import gc app = Flask(__name__) app.debug = True # database connection method def connection(): conn = MySQLdb.connect( host = "localhost", user = "testuser", passwd = "testpassword", db = "testflask" ) c = conn.cursor() return...
107
24.93
90
15
690
python
[{"finding_id": "codeql_py/reflective-xss_c3623ecaa0e2843c_5695473a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vulnerability due to a [user-provided value](3).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 67, 88 ]
[ 68, null ]
[ 16, 20 ]
[ 37, 77 ]
2024-11-18T20:10:51.924565+00:00
1,690,193,428,000
404895c889ab03e582b7bfe87dd5382ceb282b24
2
{ "blob_id": "404895c889ab03e582b7bfe87dd5382ceb282b24", "branch_name": "refs/heads/master", "committer_date": 1690193428000, "content_id": "e0b71274271076e1feefca83f35c0dade0238b0f", "detected_licenses": [ "MIT" ], "directory_id": "5127903ecf06ee0cc2d3b0863e8597c244651cc1", "extension": "py", "fi...
2.359375
stackv2
import argparse import shutil import tempfile import time from collections import defaultdict from pathlib import Path from typing import Union from tqdm import tqdm from app.attack.convert import split_by_essid from app.attack.hashcat_cmd import HashcatCmdCapture, HashcatCmdStdout from app.config import ESSID_TRIED ...
204
35.89
127
20
1,910
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5d85009e88800f34_31267c4c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 197 ]
[ null ]
[ 38 ]
[ 50 ]
2024-11-18T20:11:05.212264+00:00
1,477,428,706,000
16e983bd8e7dd57ebc21d42637e72a6c28ad09c7
2
{ "blob_id": "16e983bd8e7dd57ebc21d42637e72a6c28ad09c7", "branch_name": "refs/heads/master", "committer_date": 1477428706000, "content_id": "92ce5b645272c3035b3369e17c84d059467fe992", "detected_licenses": [ "MIT" ], "directory_id": "f354fcaa962d34323b538a4abc15496f7e0dcf30", "extension": "py", "fi...
2.421875
stackv2
from flask import Flask, render_template, request, session, redirect, url_for import urllib2, json, userdb from data import hd app = Flask(__name__) key="AIzaSyDm8rcyz9i4d8p2QvmCAumvNTM1V9CfmDA" @app.route('/') def root(): return render_template("index.html", title = 'Main') ##V link to show nearby hospitals + w...
101
32.65
169
19
869
python
[{"finding_id": "codeql_py/flask-debug_6a9cd4588d88a951_aae97b4e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 99, 22 ]
[ null, null ]
[ 5, 13 ]
[ 24, 33 ]
2024-11-18T20:26:28.886239+00:00
1,595,230,245,000
4651954353746daf670909601456c5be253e7e7a
3
{ "blob_id": "4651954353746daf670909601456c5be253e7e7a", "branch_name": "refs/heads/master", "committer_date": 1595230245000, "content_id": "3ec303faa46baa0a446b99ea47d6947753949014", "detected_licenses": [ "MIT" ], "directory_id": "afaa42ccdd2ce4277a6a5d21f7fb59c7645f3c10", "extension": "py", "fi...
3.296875
stackv2
# -------------- ##File path for the file #file_path def read_file(path): file=open(path,'r') sentence=file.read() file.close() return(sentence) #Code starts here sample_message=read_file(file_path) message_1=read_file(file_path_1) message_2=read_file(file_path_2) print(message_1) print(messag...
92
20.48
70
12
527
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6ec8a81440761d65_21bd0311", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec...
[ 84, 39, 72, 88 ]
[ null, null, null, null ]
[ 16, 7, 7, 7 ]
[ 26, 19, 19, 17 ]
2024-11-18T20:26:46.949282+00:00
1,624,540,493,000
ee28205bac602cadd7e3e3180d5df79fc4623716
3
{ "blob_id": "ee28205bac602cadd7e3e3180d5df79fc4623716", "branch_name": "refs/heads/main", "committer_date": 1624540493000, "content_id": "b84486f9e2d86580d47b09a43ae69309399c370d", "detected_licenses": [ "MIT" ], "directory_id": "65f856bb3c782fe2fec794192260d5b7aa997ef3", "extension": "py", "file...
2.9375
stackv2
"""验证相关""" import base64 from Crypto.Cipher import DES from rest_framework.authentication import BaseAuthentication from rest_framework import exceptions class WSCIsLoginAuthenticate(BaseAuthentication): """微商城是否登录验证""" def authenticate_header(self, request): """不设置验证头就会返回状态码403""" return "wsc...
110
24.95
76
17
682
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_255452f9c1e61559_d8578f30", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used." ]
[ 65, 77 ]
[ null, null ]
[ 26, 16 ]
[ 50, 43 ]
2024-11-18T20:26:47.626598+00:00
1,559,699,664,000
ca1d08eea855c5d18d0835be838adeac2884f9e9
2
{ "blob_id": "ca1d08eea855c5d18d0835be838adeac2884f9e9", "branch_name": "refs/heads/master", "committer_date": 1559699664000, "content_id": "000b02a3b2e5c8e962ac55857ad3dd3289ec78ca", "detected_licenses": [ "MIT" ], "directory_id": "9a06651e7d37f360686fcfb53cede78552ce07d8", "extension": "py", "fi...
2.375
stackv2
# Python dependencies # from __future__ import print_function # Python 2 # import copy as copy import functools as functools import json as json import logging as logging import os as os import time as time try: # Python 3 from urllib.parse import urljoin except ImportError: # Python 2 from urlparse i...
213
26.43
80
15
1,323
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_936aaeda5b109fb3_3a872deb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (passw...
[ 144, 188 ]
[ 148, 192 ]
[ 13, 13 ]
[ 14, 14 ]
2024-11-18T20:26:58.658531+00:00
1,668,435,031,000
18c83be71a8f183087ad8c307a0a479020c41ad3
3
{ "blob_id": "18c83be71a8f183087ad8c307a0a479020c41ad3", "branch_name": "refs/heads/master", "committer_date": 1668435031000, "content_id": "320744d0dee21d62aa2961991fe984f7f7c926e9", "detected_licenses": [ "MIT" ], "directory_id": "3ddbf268e44eaa24811b3d6c16fbd3055d3918d8", "extension": "py", "fi...
2.6875
stackv2
''' Download list from https://mdsched.healthway.com.ph/ to excel ''' import re import requests from time import sleep from bs4 import BeautifulSoup from requests.models import Response from requests.sessions import session from urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warn...
56
26.62
114
14
360
python
[{"finding_id": "codeql_py/request-without-cert-validation_9b0ad9f688d391af_9cbf7b3b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 19, 42 ]
[ null, null ]
[ 12, 24 ]
[ 42, 115 ]
2024-11-18T20:52:05.974646+00:00
1,586,020,929,000
fd98a23dfea36ed0e115613abaa478630d22ad89
3
{ "blob_id": "fd98a23dfea36ed0e115613abaa478630d22ad89", "branch_name": "refs/heads/master", "committer_date": 1586020929000, "content_id": "5425da284225f65779598023611dccc83287c6ea", "detected_licenses": [ "MIT" ], "directory_id": "11d604294e50d2c7ba3bd64c718e80646d3c16fd", "extension": "py", "fi...
2.5625
stackv2
# Code for the main server NodeMCU sends requests to from flask import Flask, request, jsonify from publisher import AgriIOTPublisher import json pub = AgriIOTPublisher() topic = pub.getExistingTopicPath("main") server = Flask(__name__) @server.route("/", methods=["GET"]) def index(): return "<h3>AgriIOT Clou...
55
23.76
67
14
320
python
[{"finding_id": "codeql_py/stack-trace-exposure_de4d2f711a12447d_375ab269", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 51, 55 ]
[ null, null ]
[ 24, 5 ]
[ 34, 38 ]
2024-11-18T20:52:39.694616+00:00
1,580,889,011,000
4dc8bb3e0f5bcbf2a2ac3ad8adcc16b268796d84
3
{ "blob_id": "4dc8bb3e0f5bcbf2a2ac3ad8adcc16b268796d84", "branch_name": "refs/heads/master", "committer_date": 1580889011000, "content_id": "6e8f174a49ea0f1a292a2d08929eee3e243be135", "detected_licenses": [ "MIT" ], "directory_id": "b05a7117e391c75bb7b90e92fa9a858f78d2e79a", "extension": "py", "fi...
2.859375
stackv2
import urllib.request import json from .models import Source, Article # Getting api key api_key = None # Getting the news base url base_url = None # Getting the article base url article_base_url = None def configure_request(app): global api_key,base_url,article_base_url api_key = app.config['NEWS_API_KEY']...
113
27.73
94
12
647
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a1dc6c29f211950f_3cd1c429", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 73 ]
[ null ]
[ 11 ]
[ 27 ]
2024-11-18T20:52:56.288244+00:00
1,663,892,496,000
b3f8fae4fe8d29f0770633fb8b1fa743164ac1af
3
{ "blob_id": "b3f8fae4fe8d29f0770633fb8b1fa743164ac1af", "branch_name": "refs/heads/master", "committer_date": 1663892496000, "content_id": "dd15a4e5b8741e9e525509553290b5677a8d4517", "detected_licenses": [ "MIT" ], "directory_id": "c2bf01adb17d5ed969bac7f35088edb69d4bcdd1", "extension": "py", "fi...
2.609375
stackv2
import logging from flask import Blueprint, redirect, request, url_for, render_template from flask_login import current_user, login_user, logout_user, login_required from ..database.models import User logger = logging.getLogger(__name__) web = Blueprint('web', __name__, url_prefix='/') @web.route('') @login_requi...
73
35.9
95
17
533
python
[{"finding_id": "codeql_py/log-injection_9e6d60355b430a74_4f95e5bc", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 21, 31, 33, 52 ]
[ null, null, null, null ]
[ 18, 30, 26, 22 ]
[ 74, 42, 78, 34 ]
2024-11-18T19:02:34.418170+00:00
1,607,574,201,000
6d97ecd12017bb6e14444bef3adb5b36f63a13e4
2
{ "blob_id": "6d97ecd12017bb6e14444bef3adb5b36f63a13e4", "branch_name": "refs/heads/master", "committer_date": 1607574201000, "content_id": "38ab2166d380e57b33f7ba3cd02bbe4430351ea7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9750b695e84e5a156ad11d5cbd3e34dc46af2a0b", "extension": "py"...
2.4375
stackv2
import datetime from flask import Blueprint, current_app, request from flask_restful import abort, Api, reqparse, Resource from sourcehub import api_url, error from sourcehub.database import db from sourcehub.auth import authenticate, authenticate_app, authenticate_masterkey, authenticate_session from sourcehub.models ...
244
28.25
103
17
1,608
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_66e37838c447f34f_b97b58da", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 70 ]
[ null ]
[ 19 ]
[ 51 ]
2024-11-18T19:02:35.756325+00:00
1,415,587,963,000
48996623c95307b13814bb8ffc056b2e82bb1932
2
{ "blob_id": "48996623c95307b13814bb8ffc056b2e82bb1932", "branch_name": "refs/heads/master", "committer_date": 1415587963000, "content_id": "513dd1e06495aa099f2da448da71935e6b2ffca6", "detected_licenses": [ "MIT" ], "directory_id": "84b69842977ca08dc7119f3e9f3d81422bcb5b22", "extension": "py", "fi...
2.46875
stackv2
from flask import Flask,request from multiprocessing import Process,Queue import logging import os import signal import redis import pymongo import json app = Flask(__name__) client = pymongo.MongoClient() db = client.orchestra # Development Mode logging.basicConfig(level=logging.DEBUG) # Global datastructures - lif...
147
28.35
113
18
924
python
[{"finding_id": "codeql_py/log-injection_1fcf0c2b6e239f3d_41e8fa6a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1)." ]
[ 84, 98 ]
[ null, null ]
[ 19, 19 ]
[ 50, 113 ]
2024-11-18T19:02:45.484744+00:00
1,589,802,418,000
f5ca4c1677c056b80c61f8485817d2e03f276e0c
3
{ "blob_id": "f5ca4c1677c056b80c61f8485817d2e03f276e0c", "branch_name": "refs/heads/master", "committer_date": 1589802418000, "content_id": "6cf41beebe66074c44b0d3cc4a1a06047e64cba7", "detected_licenses": [ "MIT" ], "directory_id": "69111d15d317f250714937879101b278a3da83ed", "extension": "py", "fi...
2.703125
stackv2
import json if __name__ == "__main__": with open('data/niteroi_gyms.json', 'r') as f: data = json.load(f) with open('data/vertices_niteroi.lhp', 'w') as f: f.write('VERTICES_NITEROI.LHP\n') f.write(str(len(data)) + '\n') f.write('ID NAME NEIGHBOR LATITUDE LONGITUDE\n')...
19
31.89
56
15
175
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0991b81964796364_14946e78", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 19 ]
[ null ]
[ 21 ]
[ 22 ]
2024-11-18T19:02:53.429721+00:00
1,530,826,016,000
09a7fc8750516026db7550b4b0e8575699f6af83
3
{ "blob_id": "09a7fc8750516026db7550b4b0e8575699f6af83", "branch_name": "refs/heads/master", "committer_date": 1530826016000, "content_id": "c5c30cedd757a8841b219fb07dec601bf918d3a4", "detected_licenses": [ "MIT" ], "directory_id": "46437f9e1e3d9f77312a5bd5a36cf5d7d24e35d6", "extension": "py", "fi...
2.53125
stackv2
import asyncio import tornado.web import tornado.web import tornado.websocket from peewee import DoesNotExist from config import objects from models import User, Score letters, digits = 'ABCDEFGHKL', list(range(10)) default_coordinates = [[str(digit)+letter for letter in letters] for digit in digits] class LogoutH...
267
30.58
112
24
1,773
python
[{"finding_id": "codeql_py/cookie-injection_df8abe97443b5df9_8f16f5ae", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/cookie-injection", "py/cookie-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "Cookie is constructed from a [user-supplied input](1)." ]
[ 45, 52 ]
[ null, null ]
[ 41, 37 ]
[ 49, 45 ]
2024-11-18T19:02:59.271985+00:00
1,544,044,016,000
2bcd0227c100cb6d93a7dfeae1ba59840c8109bd
2
{ "blob_id": "2bcd0227c100cb6d93a7dfeae1ba59840c8109bd", "branch_name": "refs/heads/master", "committer_date": 1544044016000, "content_id": "da997ab4dc897b406922e085ba49332e8e6a5791", "detected_licenses": [ "MIT" ], "directory_id": "8e18aa270cffa5493c592a1d771306175f5bf7af", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python # # Based on pyvmomi example code available at: # https://github.com/vmware/pyvmomi-community-samples # import sys import os import threading from time import sleep import requests from pyVim.connect import SmartConnect, Disconnect from pyVmomi import vim import VcenterInterfaces import atexit im...
332
37.11
122
18
2,704
python
[{"finding_id": "codeql_py/request-without-cert-validation_fbb57462d64c0d73_8f65fcc3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 122 ]
[ 124 ]
[ 20 ]
[ 63 ]
2024-11-18T19:03:04.172134+00:00
1,591,806,479,000
06158d731d3bf2112be0e5d2c1dcecc7d2296fee
3
{ "blob_id": "06158d731d3bf2112be0e5d2c1dcecc7d2296fee", "branch_name": "refs/heads/master", "committer_date": 1591806479000, "content_id": "d0014a1cefc28052d1a2cf0268045664d7972b0c", "detected_licenses": [ "MIT" ], "directory_id": "3af72e9e852a7e4eafd569c2035ebd703dba11e9", "extension": "py", "fi...
2.828125
stackv2
import datetime import json import logging import os from dataclasses import dataclass from json import JSONDecodeError from typing import Iterator, Optional import requests @dataclass class se_object: """Class to deal with StackExchage data collection and manipulation. """ search_terms: list query_...
135
31.2
103
19
912
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7bdd3af8c4aef59b_9dc286c1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 68 ]
[ null ]
[ 17 ]
[ 97 ]
2024-11-18T19:14:35.040810+00:00
1,376,359,833,000
d904b835f8519f62aec3883c402bee010d1f638d
3
{ "blob_id": "d904b835f8519f62aec3883c402bee010d1f638d", "branch_name": "refs/heads/master", "committer_date": 1376359833000, "content_id": "67611d1f98fa81176598643584a26067cdd0ea1f", "detected_licenses": [ "MIT" ], "directory_id": "24418d343e58d43fabd6a34c6a11fb2a7572fe6d", "extension": "py", "fi...
2.8125
stackv2
""" Create your own little shortening API. For example: gunicorn -w 4 example:app """ import redis from rfc3987 import parse from flask import Flask, request, redirect, url_for from flask import jsonify as _jsonify from werkzeug import iri_to_uri from shorten import RedisStore, NamespacedFormatter, UUIDTokenGe...
74
22.72
84
14
471
python
[{"finding_id": "codeql_py/stack-trace-exposure_d097f1f2ff250867_0a85c008", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 22 ]
[ null ]
[ 19 ]
[ 22 ]
2024-11-18T19:14:50.250657+00:00
1,600,174,499,000
f5247d22c16d3296b5c784efb59cbed1a9439e11
2
{ "blob_id": "f5247d22c16d3296b5c784efb59cbed1a9439e11", "branch_name": "refs/heads/master", "committer_date": 1600174499000, "content_id": "ded02720b0b688b3942ac5fd787c975179d6cebd", "detected_licenses": [ "MIT" ], "directory_id": "4d0e6b2e7731cf5aa865c43a73b22e8335e0adf2", "extension": "py", "fi...
2.375
stackv2
import re import pandas as pd import requests class ITOL_session(object): def __init__(self, login, password): self.login = login self.pwd = password self.session = self.do_login() self.get_data() def do_login(self): LOGIN_URL = 'https://itol.embl.de/login.cgi' ...
143
49.62
135
23
1,345
python
[{"finding_id": "codeql_py/bad-tag-filter_8118df4eb3d0ca14_c0b76c5c", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match upper case <SCRIPT> tags." ]
[ 40 ]
[ null ]
[ 42 ]
[ 63 ]
2024-11-18T19:27:35.614374+00:00
1,630,461,417,000
1bbb9f83a18719fe9a86a929547a0a48cf54fe2b
3
{ "blob_id": "1bbb9f83a18719fe9a86a929547a0a48cf54fe2b", "branch_name": "refs/heads/main", "committer_date": 1630461417000, "content_id": "e9d2a9122fb2654d8c28a4543f8b70c1102349eb", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "ba93242bb221431b3bea6140191b59159c9fe1cb", "extensi...
2.96875
stackv2
# SqaPyCleanSpotify: Replace Explicit Content on Your Spotifyy Playlists # Author flancast90 (Finn Lancaster) # Copyright: MIT License # import statement calls and external libs """ List of external libs, can be installed by: - pip install spotipy """ import spotipy from spotipy.oauth2 import SpotifyOAuth import os...
136
37.85
176
16
1,263
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0878733bb131a6e0_7b0ae682", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 37 ]
[ null ]
[ 17 ]
[ 86 ]
2024-11-18T19:27:35.670617+00:00
1,473,744,253,000
e547a1c920031b85a1989f4dc31f030a5cba5306
3
{ "blob_id": "e547a1c920031b85a1989f4dc31f030a5cba5306", "branch_name": "refs/heads/master", "committer_date": 1473744253000, "content_id": "3de1f82da60e10709270da7539232282b449ca17", "detected_licenses": [ "MIT" ], "directory_id": "b95a6064a6c07bc1caef37ad8796d063ee3b5005", "extension": "py", "fi...
2.765625
stackv2
""" Create a SCP side-channel to transfer a file to remote network device. SCP requires a separate SSH connection. Currently only supports Cisco IOS and Cisco ASA. """ from __future__ import print_function from __future__ import unicode_literals import re import os import hashlib import paramiko import scp class...
249
34.94
93
17
1,905
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bbd47170cd4d67dc_537239d6", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 29 ]
[ null ]
[ 9 ]
[ 76 ]
2024-11-18T19:27:38.443451+00:00
1,576,934,037,000
7b3ea4676d7ad764dd2ff1caf79c07d121e90f51
3
{ "blob_id": "7b3ea4676d7ad764dd2ff1caf79c07d121e90f51", "branch_name": "refs/heads/master", "committer_date": 1576934037000, "content_id": "26557407dbe0db245cb9579b6828d676be300a8f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "55c6bf1d3155daf8197e136e5cee95e5d456e4a4", "extension": "py"...
2.75
stackv2
import cv2 import math import PNSR import copy class PVD: def __init__(self, msg, img): self.msg = msg self.img = img def msgToBinary(self): stringBinary = ' '.join(map(bin, bytearray(self.msg, 'utf8'))) stringBinary = stringBinary.replace(" ", "") # print(stringBinar...
121
40.66
100
25
1,302
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ddb88c8f985a7882_ea058b32", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 33, 60, 63 ]
[ null, null, null ]
[ 24, 56, 56 ]
[ 33, 100, 79 ]
2024-11-18T19:27:47.279851+00:00
1,546,713,936,000
428272d860e2f041fd2db308e07608338de71996
2
{ "blob_id": "428272d860e2f041fd2db308e07608338de71996", "branch_name": "refs/heads/master", "committer_date": 1546713936000, "content_id": "cac615853ab891b140d9e955082d94ae8e973c86", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "b5b92a47803fa0aef32b27a38d62d8344ef8f699", "extension": "p...
2.421875
stackv2
import pprint import json import os from jinja2 import Template topics = {} for topic_file in os.listdir('data/topics'): if topic_file[0] == '.': continue with open('data/topics/'+topic_file) as json_file: try: topic = json.load(json_file) except: print topic_f...
31
26.84
68
13
200
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_082fb75566519b92_44f2e30f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ null ]
[ 16 ]
[ 46 ]
2024-11-18T19:38:30.588854+00:00
1,601,580,096,000
f0aabc87eba727f370dd66317c7084bbe718dbf2
3
{ "blob_id": "f0aabc87eba727f370dd66317c7084bbe718dbf2", "branch_name": "refs/heads/master", "committer_date": 1601580096000, "content_id": "f80464b6cf8c4b85731c80081eea878f076601ba", "detected_licenses": [ "MIT" ], "directory_id": "4febf49fa8038172431780340b5bd37c1a9d4442", "extension": "py", "fi...
3.0625
stackv2
""" Hosts general utility functions for Makeability Lab Django website """ import re # helper function to correctly capitalize a string, specify words to not capitalize in the articles list # from: https://stackoverflow.com/a/3729957 # Note: this code written by J. Gilkeson and needs to be cleaned up (and/or removed i...
35
44.83
126
13
426
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8ffa0032f9ccac90_8f2f5d6c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 22 ]
[ null ]
[ 35 ]
[ 61 ]
2024-11-18T19:38:50.505709+00:00
1,680,612,963,000
c5ef6703aee09883f361015a5f5a60dd7ac624c0
3
{ "blob_id": "c5ef6703aee09883f361015a5f5a60dd7ac624c0", "branch_name": "refs/heads/main", "committer_date": 1680612963000, "content_id": "21da4d46c5f9341d06d544dde5f29ec4938eef6c", "detected_licenses": [ "MIT" ], "directory_id": "a5ec1f892dc504d815d9e0af3e7a84c05c9466e9", "extension": "py", "file...
2.890625
stackv2
""" A function for asking the user for their Twitter API keys. """ import requests from requests_oauthlib import OAuth1 from urllib.parse import parse_qs def handshake(): # Default empty keys consumer_key = "" consumer_secret = "" access_token = "" access_token_secret = "" bearer_token = in...
118
33.29
163
13
839
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e4ab8d6163c1d57c_69f85bfa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 80 ]
[ 81 ]
[ 13 ]
[ 28 ]
2024-11-18T20:06:09.663853+00:00
1,559,424,872,000
821ed72dced919ee70132424daf6cfdefecc7501
3
{ "blob_id": "821ed72dced919ee70132424daf6cfdefecc7501", "branch_name": "refs/heads/master", "committer_date": 1559424872000, "content_id": "8da29dd11fabf1c7a34eef3f65d39c607f240763", "detected_licenses": [ "Apache-2.0" ], "directory_id": "83d348e2ca9389dd89ae8b0863ba6073494d5716", "extension": "py"...
2.96875
stackv2
import http.client import json import click def get_inputs(rpc, address, startblock, api_key=''): conn = http.client.HTTPSConnection(rpc) conn.request( "GET", f"/api?module=account&action=txlist&address={address}" f"&startblock={startblock}&page=1&sort=asc&apikey={api_key}" ) ...
79
23.1
74
13
520
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5255da85dd9f8b71_9717880c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 31, 38 ]
[ null, null ]
[ 15, 15 ]
[ 43, 63 ]
2024-11-18T20:06:22.680793+00:00
1,525,691,909,000
6bf81fbba74926fe9b7f579941b35473565137b7
3
{ "blob_id": "6bf81fbba74926fe9b7f579941b35473565137b7", "branch_name": "refs/heads/master", "committer_date": 1525691909000, "content_id": "4582d169ed8317c11d5ca7f1a9e8cf5cc32a93e1", "detected_licenses": [ "MIT" ], "directory_id": "329c00c2699f4fa3459d077c4000eeef41e86f4b", "extension": "py", "fi...
2.8125
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import random import string import re import time import requests import argparse #打印日志 import logging #设置日志等级 logging.basicConfig(filename='example.log', filemode="a", level=logging.DEBUG) #输入你的邀请链接 url = '' #你需要的邀请数量 max_num = 50 def getuser(): user = ''.join(random....
93
23.33
84
12
595
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_0010ba1a0d3b3066_6c917704", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'processon.com/signup/verification/'...
2
true
[ "CWE-020", "CWE-312" ]
[ "py/incomplete-hostname-regexp", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'processon.com/signup/verification/', so it might match more hosts than expected.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 74, 51 ]
[ null, null ]
[ 11, 11 ]
[ 60, 65 ]
2024-11-18T20:06:32.005904+00:00
1,578,787,044,000
d76d6acb90dd383ec6c4ecf1141ee051e1aa2d70
3
{ "blob_id": "d76d6acb90dd383ec6c4ecf1141ee051e1aa2d70", "branch_name": "refs/heads/master", "committer_date": 1578787044000, "content_id": "e09a28e8510375843505d2cf8c61acb1b6e8daa4", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "7082ba3c9713341dd63ed2fc69027fe6e5121fba", "extension": "p...
2.5625
stackv2
import aiohttp import asyncio import logging from hashlib import md5 from yarl import URL from .exceptions import Error, APIError, AuthError, OKAuthError from .utils import SignatureCircuit from .parsers import AuthDialogParser, AccessDialogParser log = logging.getLogger(__name__) REST_NO_SIGN_ARGS = ["sig", "access...
359
33.74
105
21
2,631
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e6b972b344e947c5_f030ddd1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 118, 128 ]
[ null, null ]
[ 24, 20 ]
[ 45, 41 ]
2024-11-18T20:18:24.096267+00:00
1,557,931,335,000
29015482c3c211bafd323f7acd8618ecca8d5134
2
{ "blob_id": "29015482c3c211bafd323f7acd8618ecca8d5134", "branch_name": "refs/heads/master", "committer_date": 1558537069000, "content_id": "0e80342cf4d67a80e726b7cd10abbc5d13df627d", "detected_licenses": [ "MIT" ], "directory_id": "494dba4e7ee13ad07c1cb44f60d5efe7bb30a5d1", "extension": "py", "fi...
2.390625
stackv2
from pyphen import Pyphen import pandas as pd import re import spacy from math import log import html import numpy as np from torchtext import data as torchdata from sklearn.feature_extraction.text import TfidfVectorizer reduce = {'do_reducing': True, 'reduce_to': 10} # for debugging do_feature_extraction = False sa...
282
31.99
136
15
2,489
python
[{"finding_id": "codeql_py/overly-large-range_83fa1b417a0673c7_815a4c22", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 104, 105 ]
[ null, null ]
[ 64, 47 ]
[ 67, 50 ]
2024-11-18T20:18:25.059559+00:00
1,593,763,581,000
47b7f35bf19cd4e0c8246ec7075dde5cb06b4561
3
{ "blob_id": "47b7f35bf19cd4e0c8246ec7075dde5cb06b4561", "branch_name": "refs/heads/master", "committer_date": 1593763581000, "content_id": "f9519ee8ca804381ffee3c3c9b2c9100f7b1a4ae", "detected_licenses": [ "MIT" ], "directory_id": "662a441d7a4b61714392b09a339e84d87e90e7ed", "extension": "py", "fi...
2.96875
stackv2
"""Client to handle connections and actions executed against a remote host.""" from os import system from paramiko import SSHClient, AutoAddPolicy, RSAKey from paramiko.auth_handler import AuthenticationException, SSHException from scp import SCPClient, SCPException from .log import logger class RemoteClient: """...
116
33.49
104
18
813
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b9116744e3259185_8abb8cda", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 47 ]
[ null ]
[ 17 ]
[ 73 ]
2024-11-18T20:18:33.191125+00:00
1,579,167,900,000
418df8df3b2970c95d1c765da204597bf14b8b14
3
{ "blob_id": "418df8df3b2970c95d1c765da204597bf14b8b14", "branch_name": "refs/heads/master", "committer_date": 1579167900000, "content_id": "39d26cab05e30f2289299122e8181c55dbbe446f", "detected_licenses": [ "MIT" ], "directory_id": "3a7e3f540fe5b77fc7841bbbffb5fb60fbcff916", "extension": "py", "fi...
2.625
stackv2
import boto3 class SecretManager: def __init__(self, region_name='us-east-1', secrets_mapping={}): self.ssm = boto3.client('ssm', region_name=region_name) self.secrets = {} self.load_secrets(secrets_mapping) def get_secret(self, secret_name): if not self.secrets.get(secret_nam...
32
32.38
106
17
225
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1510bc09129c2132_e31e44e5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 13 ]
[ 16 ]
[ 17 ]
[ 18 ]
2024-11-18T20:18:33.882151+00:00
1,592,538,739,000
fa1a3136fc634dc41d6f213163ce8381e907135e
3
{ "blob_id": "fa1a3136fc634dc41d6f213163ce8381e907135e", "branch_name": "refs/heads/master", "committer_date": 1592538739000, "content_id": "5075e4fc13673f2b7183a78071aded02d5946ea9", "detected_licenses": [ "MIT" ], "directory_id": "ddee2095876636c989034e96f97de2a0a5336b18", "extension": "py", "fi...
2.640625
stackv2
import json import urllib.request # Enter your AlphaVantage API Key here API_KEY = "" # Headers for CORS support cors_headers = { "Access-Control-Allow-Headers": "Content-Type", "Access-Control-Allow-Origin": "*", "Access-Control-Allow-Methods": "OPTIONS,POST,GET", } def lambda_handler(event, context)...
42
30.05
100
14
330
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9886e4f316b16596_2f1cbab7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 23 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-18T20:31:14.713174+00:00
1,633,701,313,000
e6aac6077c6b3c52894188f2e4d462fdc7bbdeb4
3
{ "blob_id": "e6aac6077c6b3c52894188f2e4d462fdc7bbdeb4", "branch_name": "refs/heads/main", "committer_date": 1633701313000, "content_id": "9d31ea5cb878872a2e15ae2ad835f6f80c7a513c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4f2676ebbe4f8d625e7eeb2092fffb998b54a217", "extension": "py", ...
2.640625
stackv2
import os from flask import Flask, flash, request, redirect, render_template from werkzeug.utils import secure_filename from google.cloud import storage app=Flask(__name__) app.secret_key = "secret key" app.config['MAX_CONTENT_LENGTH'] = 16 * 1024 * 1024 # Get current path path = os.getcwd() # file Upload UPLOAD_FOLD...
75
37.24
161
22
676
python
[{"finding_id": "codeql_py/url-redirection_56aca9c42f67c7d7_dd9eadb0", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-022" ]
[ "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 36, 52 ]
[ null, null ]
[ 29, 27 ]
[ 40, 40 ]
2024-11-18T20:31:35.026836+00:00
1,629,279,332,000
a683cb5aadefa2cbfe2967159355d51367000c0b
4
{ "blob_id": "a683cb5aadefa2cbfe2967159355d51367000c0b", "branch_name": "refs/heads/main", "committer_date": 1629279332000, "content_id": "434bd93206b706ff01003ed6127a33c7c8e5c338", "detected_licenses": [ "MIT" ], "directory_id": "8f9170d1ee3a1215b01f6810805d9d3f4acbe1fa", "extension": "py", "file...
4.0625
stackv2
import random def jogar(): print("\n\nOla felipe vamos arrasar no python!!!!!!!") print("***********************************************") print("Bem-Vindo ao Jogo de Adivinhação!") print("************************************************") print("Nivel de dificuldade\n(1) facil numeros entre 1 a ...
54
38.13
132
21
582
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_612eb0dd9f62eac1_63e548f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text." ]
[ 49 ]
[ null ]
[ 15 ]
[ 112 ]
2024-11-18T20:31:38.226273+00:00
1,602,573,077,000
c5c9818f36b5b25a040da1c4b8c9071a31657531
2
{ "blob_id": "c5c9818f36b5b25a040da1c4b8c9071a31657531", "branch_name": "refs/heads/master", "committer_date": 1602573077000, "content_id": "4826d1ff66cad3148a7f6a2fa395f49d1bc2ecb6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b0ab884e8a2654ca79bec52a34a5327de2472177", "extension": "py"...
2.484375
stackv2
import subprocess import os import crypt import string import random import shutil import ssl import requests from urllib.parse import urlparse from OpenSSL.crypto import load_certificate, FILETYPE_PEM class CommandUtils(object): def __init__(self, logger): self.logger = logger def run(self, cmd): ...
106
34.09
104
19
820
python
[{"finding_id": "codeql_py/request-without-cert-validation_6ca2b8c72994b632_916256a4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 62 ]
[ null ]
[ 17 ]
[ 75 ]
2024-11-18T20:43:26.579235+00:00
1,594,299,004,000
46c36be4d2d6727e302744f1804f6721eecbcbe6
2
{ "blob_id": "46c36be4d2d6727e302744f1804f6721eecbcbe6", "branch_name": "refs/heads/master", "committer_date": 1594299004000, "content_id": "662ec4fe6b6064ef2815cdfea9f76e85c7d11506", "detected_licenses": [ "MIT" ], "directory_id": "def481643374b6c7c34612bae2849458bb77d9e8", "extension": "py", "fi...
2.375
stackv2
import logging from flask import Flask, jsonify, request from mlsearch_api.api_requester import fetch_github logging.basicConfig(level=logging.INFO) logger = logging.getLogger(__name__) app = Flask(__name__) @app.route('/') def ping(): return 'ML Search: It Works!' @app.route('/search', methods=['GET']) def s...
32
23.12
71
11
179
python
[{"finding_id": "codeql_py/log-injection_68b2f00071f4839d_4ba0ac4a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 17 ]
[ 42 ]
2024-11-18T20:43:53.761461+00:00
1,682,114,542,000
fdfc68e619739c6de94e35de5791997fdd1a1223
2
{ "blob_id": "fdfc68e619739c6de94e35de5791997fdd1a1223", "branch_name": "refs/heads/master", "committer_date": 1682114542000, "content_id": "7feaab805a8fb8b45141ec15c78ec6efa8db590c", "detected_licenses": [ "MIT" ], "directory_id": "037eae4716d734bfb7377458da42b492e0a000fd", "extension": "py", "fi...
2.3125
stackv2
import re import hazm import parsivar import numpy as np from os import path from wordcloud_fa import WordCloudFa as WordCloud from PIL import Image from collections import Counter from pprint import pprint from itertools import filterfalse from tqdm import tqdm default_stop_words_path = path.join(path.dirname(__fi...
294
38.1
142
16
3,251
python
[{"finding_id": "codeql_py/overly-large-range_9348dea830f63db3_8c878301", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
7
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 25, 25, 25, 25, 25, 25, 26 ]
[ null, null, null, null, null, null, null ]
[ 7, 10, 13, 16, 22, 25, 14 ]
[ 11, 14, 17, 20, 26, 29, 18 ]
2024-11-18T20:43:55.441124+00:00
1,646,302,492,000
217d1cc67684ea7d4907b0bd40bc8fb00448c097
3
{ "blob_id": "217d1cc67684ea7d4907b0bd40bc8fb00448c097", "branch_name": "refs/heads/master", "committer_date": 1646302492000, "content_id": "5ea774765567dbd1f3632c07575ccb05e7ad220a", "detected_licenses": [ "MIT" ], "directory_id": "e64c287e25aa6289691b92501603266a451bb131", "extension": "py", "fi...
3.09375
stackv2
import scrapy from jinja2 import Template from emailer import send_mail class PageSpider(scrapy.Spider): home_url = 'http://www.prodirectselect.com/' def parse(self, response): ''' Parse the response downloaded for each of the requests made. :param response: holds the page co...
57
28.54
72
18
333
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fae78ecb2b7e930c_ffab2c14", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 43 ]
[ 55 ]
[ 20 ]
[ 13 ]
2024-11-18T20:43:58.356391+00:00
1,594,060,022,000
d566cb910fe7f287488ffe803d8016a2cc21ee40
3
{ "blob_id": "d566cb910fe7f287488ffe803d8016a2cc21ee40", "branch_name": "refs/heads/master", "committer_date": 1594060022000, "content_id": "1c552fceb355f440c272a95fd368db976264458e", "detected_licenses": [ "MIT" ], "directory_id": "3d263c8767ce4055f3cfe2ef6bf8b8453ea9a853", "extension": "py", "fi...
3.09375
stackv2
# -------------- def read_file(filename): f=open(filename,mode='r') sentence= f.readline() return sentence sample_message=read_file(file_path) print(sample_message) message_1=read_file(file_path_1) print(message_1) message_2=read_file(file_path_2) print(message_2) def fuse_msg(message_a,message_b): qu...
69
24.77
67
11
482
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_86936b580fdcda5b_5305d9cf", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec...
[ 62, 18, 31, 45, 56, 66 ]
[ null, null, null, null, null, null ]
[ 13, 7, 7, 7, 7, 7 ]
[ 23, 19, 19, 19, 19, 17 ]
2024-11-18T20:44:02.149375+00:00
1,550,185,627,000
e33d7bc43a9282b8ed5a16f2fb35ef4723e085f7
4
{ "blob_id": "e33d7bc43a9282b8ed5a16f2fb35ef4723e085f7", "branch_name": "refs/heads/master", "committer_date": 1550185627000, "content_id": "7b5356e269eb057dafc4a359060b1b56809062e8", "detected_licenses": [ "MIT" ], "directory_id": "a4c543f2662406610020ee58913b68be45b6b9c1", "extension": "py", "fi...
3.65625
stackv2
""" Decorator is a structural pattern that allows adding new behaviors to objects dynamically by placing them inside special wrapper objects. Using decorator you can wrap objects countless number of times since both target objects and decorators follow the same interface. The resulting object will get a stacking behav...
129
26.4
115
14
805
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3e07ed629e250d21_395f6a21", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 121 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-18T20:44:11.520420+00:00
1,587,167,693,000
a18323af30b6011f61361cda8579dfea13961389
3
{ "blob_id": "a18323af30b6011f61361cda8579dfea13961389", "branch_name": "refs/heads/master", "committer_date": 1587167693000, "content_id": "03ec0acd717aa9849e095c76ded8d08a6865694c", "detected_licenses": [ "MIT" ], "directory_id": "e48ea9398cb909a225188ffe48da83327be82522", "extension": "py", "fi...
2.546875
stackv2
import os import subprocess import sys from bottle import request, response, route, post, run, template, static_file from .markdown import get_markdown_files, search_markdown_files class Templates: """ Very simple data class to perform a small path manipulation on the templates allows easy access of templa...
135
34.47
88
16
986
python
[{"finding_id": "codeql_py/path-injection_2d910e5f48861d49_069cccbd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 92, 102, 116 ]
[ null, null, null ]
[ 19, 23, 23 ]
[ 27, 36, 36 ]
2024-11-18T20:44:15.209209+00:00
1,607,815,472,000
8e75e170cb85e325fcf60d1f361f0371df89d7e9
4
{ "blob_id": "8e75e170cb85e325fcf60d1f361f0371df89d7e9", "branch_name": "refs/heads/master", "committer_date": 1607815472000, "content_id": "707a41f0c886eb370de20b1e6b6c41e01075608b", "detected_licenses": [ "MIT" ], "directory_id": "7bca7883bbd57354e5ca3afe21f29b13bf1a1927", "extension": "py", "fi...
3.5625
stackv2
from collections import Counter A = 236491 B = 713787 def password_count(): valid_p1 = 0 valid_p2 = 0 for x in range(A, B): x_str = str(x) if ''.join(sorted(x_str)) != x_str: continue counter = Counter(x_str) if any(v for v in counter.values() if v >= 2): ...
27
20.59
54
12
183
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8f104b06f81ec7d0_d67cab7f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 26, 27 ]
[ null, null ]
[ 11, 11 ]
[ 34, 34 ]
2024-11-18T20:44:15.673882+00:00
1,582,333,197,000
e36354e33a0c595c5d3bc34216025810b4071123
2
{ "blob_id": "e36354e33a0c595c5d3bc34216025810b4071123", "branch_name": "refs/heads/master", "committer_date": 1582333197000, "content_id": "59c2f502484fc9c2ca4a6a0fa00640aaddd59585", "detected_licenses": [ "MIT" ], "directory_id": "f0932f59d37adfbba9307ee31e6f78ce3c256c4a", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python3 import jinja2 import subprocess from pathlib import Path def render_template(path, context, template_dir='.'): loader = jinja2.FileSystemLoader(template_dir) env = jinja2.Environment(loader=loader) template = env.get_template(f'{path}.jinja') template.stream(**context).dump(path...
50
20.86
61
13
297
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fe21d3043359cd67_2f3e98ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ null ]
[ 11 ]
[ 44 ]
2024-11-18T20:57:33.293208+00:00
1,491,060,739,000
045e9ec41c1caec8d9e0608e11ee64f701d6daab
3
{ "blob_id": "045e9ec41c1caec8d9e0608e11ee64f701d6daab", "branch_name": "refs/heads/master", "committer_date": 1491060739000, "content_id": "edd646794392a5a8d6b99bb5711523a1560712ea", "detected_licenses": [ "MIT" ], "directory_id": "18860547af5f2fdc0bd676d6071786ce29e6fe0f", "extension": "py", "fi...
2.609375
stackv2
from google.appengine.ext import db import random import hashlib from string import letters def users_key(group = 'default'): return db.Key.from_path('users', group) # User encryption and validation functions def make_salt(length = 5): return ''.join(random.choice(letters) for x in xrange(length)) def valid...
112
26.26
66
17
697
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b84981c1e97269db_bb90c489", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 21 ]
[ null ]
[ 24 ]
[ 40 ]
2024-11-18T20:57:38.959066+00:00
1,486,080,836,000
3cf78b6ed6b236339b08ec3a8047ed4a31fa077e
2
{ "blob_id": "3cf78b6ed6b236339b08ec3a8047ed4a31fa077e", "branch_name": "refs/heads/master", "committer_date": 1486080836000, "content_id": "a440921d3bb16ea4083a620f3dfce566ee31a91c", "detected_licenses": [ "MIT" ], "directory_id": "029120d1bb23837f5e82adc7815395be64c23634", "extension": "py", "fi...
2.359375
stackv2
""" Sample Flask Login app with KnuVerse AudioPass. Credit: https://github.com/shekhargulati/flask-login-example """ from flask import Flask, Response, redirect, request, abort, escape, \ send_from_directory from flask_login import LoginManager, UserMixin, \ login_required, login_user, logout_user import json...
200
27.96
113
20
1,335
python
[{"finding_id": "codeql_py/reflective-xss_6ba62f0b212a30de_24d8ed9c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-601" ]
[ "py/reflective-xss", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 117, 84 ]
[ 158, null ]
[ 25, 13 ]
[ 39, 84 ]
2024-11-18T20:57:40.612189+00:00
1,625,469,801,000
7b3f56a0023fa7d986f86529bad16eb162d4576b
2
{ "blob_id": "7b3f56a0023fa7d986f86529bad16eb162d4576b", "branch_name": "refs/heads/master", "committer_date": 1625469801000, "content_id": "5db363a29c0964b8fe0a903fe4dad1a757148bb8", "detected_licenses": [ "MIT" ], "directory_id": "21d464498148d2adb84329a36037f9c886b13224", "extension": "py", "fi...
2.34375
stackv2
from flask import Blueprint, render_template, redirect, request, flash, url_for import hashlib from flask import make_response import xml.etree.ElementTree as ET wechat = Blueprint( "wechat", __name__, template_folder="../templates", static_folder="../static") WX_TOKEN = 'duansq' @wechat.route("/wechat_api/", ...
37
27.95
84
16
288
python
[{"finding_id": "codeql_py/reflective-xss_ddd2bb8a8dbbb940_771d4a2e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 35 ]
[ 42 ]
2024-11-18T20:57:42.509321+00:00
1,693,079,090,000
4071c3b9b0b1ae7a16054b11450857152dd16a80
3
{ "blob_id": "4071c3b9b0b1ae7a16054b11450857152dd16a80", "branch_name": "refs/heads/master", "committer_date": 1693079090000, "content_id": "1dbd223a8d1c6ae31eeb9744a08912b6391aa96c", "detected_licenses": [ "MIT" ], "directory_id": "9c268aa04ab8b359d11399f94a30c8f4fe171a0c", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python """ Generates an AXI Stream switch wrapper with the specified number of ports """ import argparse from jinja2 import Template def main(): parser = argparse.ArgumentParser(description=__doc__.strip()) parser.add_argument('-p', '--ports', type=int, default=[4], nargs='+', help="number of...
271
37.31
128
12
3,209
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b5fe890ef6904c6b_4af3bcaa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44 ]
[ 253 ]
[ 9 ]
[ 5 ]
2024-11-18T20:57:58.244512+00:00
1,572,604,903,000
ea7aa2f681a9a3df217752066a64ff00195f6a30
3
{ "blob_id": "ea7aa2f681a9a3df217752066a64ff00195f6a30", "branch_name": "refs/heads/master", "committer_date": 1572604903000, "content_id": "bae4d1bfb1746be9236a303faac5b785207bae52", "detected_licenses": [ "MIT" ], "directory_id": "9c5e6940ccbfa87754a0b993435f7d273b04a1dd", "extension": "py", "fi...
3.125
stackv2
from tkinter import * import os def register(): global register_screen register_screen = Toplevel(main_screen) register_screen.title("Register") register_screen.geometry("300x250") global username global password global username_entry global password_entry username = StringVar...
224
30.28
106
12
1,755
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_60d3ac43a8780bf0_b97471d3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 71 ]
[ null ]
[ 16 ]
[ 29 ]
2024-11-18T20:58:21.474328+00:00
1,542,023,429,000
94b822335af80f7219d525e7eaaf40ec91773923
3
{ "blob_id": "94b822335af80f7219d525e7eaaf40ec91773923", "branch_name": "refs/heads/master", "committer_date": 1542023429000, "content_id": "08160c27ff15d128809bc8eb19087528f778dfea", "detected_licenses": [ "MIT" ], "directory_id": "3a474328c2b21c98f60d355aff1a3920a3fb5f9c", "extension": "py", "fi...
3.078125
stackv2
import os from jinja2 import Template class SimpleTemplate(object): def __init__(self): self.template = Template('') self.context = '' def load_from_file(self, template): if not os.path.isfile(template): return f = open(template, 'r') self.context = '' ...
35
22.2
54
11
193
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_31ce4db281671144_a197b991", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 6, 17 ]
[ null, null ]
[ 25, 25 ]
[ 37, 47 ]
2024-11-18T20:58:36.119385+00:00
1,471,003,212,000
cc071d763ded059b4f8bc0e7fa11ccf3e165871d
2
{ "blob_id": "cc071d763ded059b4f8bc0e7fa11ccf3e165871d", "branch_name": "refs/heads/master", "committer_date": 1471003212000, "content_id": "f84a95a69879647083b62a3a7eda712783896f35", "detected_licenses": [ "Apache-2.0" ], "directory_id": "546c7bba2c816e824e7933d26dfd516741547a56", "extension": "py"...
2.40625
stackv2
# # Copyright 2015-present Boling Consulting Solutions, bcsw.net # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless requir...
99
30.33
96
15
733
python
[{"finding_id": "codeql_py/reflective-xss_17801b579b7c25e2_c3d7df55", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 41 ]
[ null ]
[ 16 ]
[ 42 ]
2024-11-18T20:58:40.438442+00:00
1,556,698,234,000
9e36a52248ddf8663334042ef0ce1b4fb8a1d162
2
{ "blob_id": "9e36a52248ddf8663334042ef0ce1b4fb8a1d162", "branch_name": "refs/heads/master", "committer_date": 1556698234000, "content_id": "699e30f190ce446a04c71a46ca3ff3166c9a81a7", "detected_licenses": [ "MIT" ], "directory_id": "f245601bab546cce025b4378010c3c75f9193651", "extension": "py", "fi...
2.390625
stackv2
# -*- coding: UTF-8 -*- from flask import request, render_template, flash, redirect, url_for from sqlalchemy import or_ from wtforms import ValidationError from flask_login import login_user, logout_user from app.main_views import main from app.main_views.forms import RegisterForm, LoginForm from app.models import Us...
58
33.52
114
18
419
python
[{"finding_id": "codeql_py/url-redirection_7458ff31aacc4bbe_397e5982", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 48 ]
[ null ]
[ 29 ]
[ 58 ]
2024-11-18T21:10:09.850874+00:00
1,691,855,948,000
07d01876f62872adf7e289459b00f30e3ee92067
3
{ "blob_id": "07d01876f62872adf7e289459b00f30e3ee92067", "branch_name": "refs/heads/main", "committer_date": 1691855948000, "content_id": "d61683a0901cec4b24739fd6db9e7967d6be992c", "detected_licenses": [ "MIT" ], "directory_id": "416559370cfed287db119360d2747783c6bcc512", "extension": "py", "file...
2.640625
stackv2
from collections import defaultdict import jinja2 import os from urllib.parse import urljoin from .. import util from .base import Renderer from .util import markdown_func, media_url_func, absolute_url_func # Route reference # / Posts # /page/:page/ Posts page #:page # /tag/:tag/ Posts matching ...
178
33.02
79
19
1,311
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_375d08b1128b67fc_6ea76429", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 36 ]
[ 38 ]
[ 26 ]
[ 10 ]
2024-11-18T21:10:34.004247+00:00
1,541,536,043,000
7d03e6453bdae14308db740256a6694304839726
2
{ "blob_id": "7d03e6453bdae14308db740256a6694304839726", "branch_name": "refs/heads/master", "committer_date": 1541536043000, "content_id": "55b8ea19e05247b35e336c6cee57b3638cef3d2b", "detected_licenses": [ "MIT" ], "directory_id": "7c688afb28d47b96c62faf0fe45f37f50c49aebe", "extension": "py", "fi...
2.484375
stackv2
import argparse import os from boltons import fileutils parser = argparse.ArgumentParser(description='Create and index file for ALLSSTAR data, index.txt is create in the path of the dataset') parser.add_argument('--src', help='data dir', required=True) parser.add_argument('--ext', help='extension to index', required=T...
34
39.44
135
15
364
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e4c7646577f01f89_4bc65bc8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 33 ]
[ null ]
[ 34 ]
[ 38 ]
2024-11-18T21:10:45.140597+00:00
1,692,828,071,000
ab9ba3ad7b8e2599365d6defa65add862e32eadf
3
{ "blob_id": "ab9ba3ad7b8e2599365d6defa65add862e32eadf", "branch_name": "refs/heads/main", "committer_date": 1692828071000, "content_id": "593337c82d7afd397cebf2ddce0041c6f0fed3bd", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a3d6556180e74af7b555f8d47d3fea55b94bcbda", "extension": "py"...
3.125
stackv2
#!/usr/bin/env python # Copyright 2022 The Chromium Authors # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. import optparse import os import shutil import sys import tarfile # A python script that unpacks the pumpkin tar archive by: # 1. Extracting the tar into a...
76
32.66
80
11
611
python
[{"finding_id": "codeql_py/tarslip_06d731ff0d0e2e9a_528e6eb6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 63 ]
[ null ]
[ 3 ]
[ 6 ]
2024-11-18T21:10:50.819071+00:00
1,662,362,316,000
1522833b71012e422551cc8db514503b4ac7204e
3
{ "blob_id": "1522833b71012e422551cc8db514503b4ac7204e", "branch_name": "refs/heads/master", "committer_date": 1662362316000, "content_id": "2c8c3eb537b3701307986f638667a1755714dd6a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e96889bdfc11b1fefe00b23ca3ef0944f6cce3e6", "extension": "py"...
2.6875
stackv2
""" Routes to handle request related to case. """ # Import dependencies import sqlite3 as sql import os import json import datetime from flask import Blueprint, jsonify, request, make_response, send_file from flask.wrappers import Response from api.models.case import Case from api.models.extractor import Extractor fro...
371
25.51
104
16
2,221
python
[{"finding_id": "codeql_py/reflective-xss_43d2c0553dc12f48_46ea0651", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
4
true
[ "CWE-079", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vulnerability due to a [user-provided value](3).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value]...
[ 119, 94, 106, 209 ]
[ null, null, null, null ]
[ 12, 24, 24, 41 ]
[ 16, 28, 28, 54 ]
2024-11-18T21:11:06.476022+00:00
1,629,126,212,000
5b9fd51766b3f04789cf8b13990e3ac7941f3887
3
{ "blob_id": "5b9fd51766b3f04789cf8b13990e3ac7941f3887", "branch_name": "refs/heads/master", "committer_date": 1629126212000, "content_id": "c2e9efa7936de6e749163652553ef614b93649f6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7d7f36d82ce64ef48e9b69f09e6d622b23abda1f", "extension": "py"...
2.65625
stackv2
import requests import re import json def RemoteBulitTimeList(start_time_year, start_time_month, start_time_day, end_time_year, end_time_month, cid_num, headers): time_list = list() for i in range(abs((start_time_year - end_time_year) * 12 + (start_time_month - end_time_month) * 1) + 1): if len(str(st...
45
40.2
160
20
490
python
[{"finding_id": "codeql_py/request-without-cert-validation_32febdd79d737162_7bb1e890", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 15 ]
[ null ]
[ 19 ]
[ 82 ]
2024-11-18T21:11:14.288656+00:00
1,638,191,288,000
93c62d85fc29b7411ba5e33d8a4018fcfcf1b740
3
{ "blob_id": "93c62d85fc29b7411ba5e33d8a4018fcfcf1b740", "branch_name": "refs/heads/main", "committer_date": 1638191288000, "content_id": "48ebe919832dabf6d6fd51bc49bf723ef45891d2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "edd94cc385fee12a1a9dd473b9895ad27fd300c3", "extension": "py", ...
2.65625
stackv2
# !/usr/bin/env python # -*- encoding: utf-8 -*- # @File: main.py import os import re import sys import traceback from multiprocessing.dummy import Pool from os.path import isfile import cv2 try: from .counter import Counter from .ops.blur import Blur from .ops.fliph import FlipH from .ops.flipv impor...
185
28.79
71
19
1,332
python
[{"finding_id": "codeql_py/redos_a6937addcbdef4ec_79a8bbbc", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '__' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '__' and containing many repetitions of 'a__'." ]
[ 41 ]
[ null ]
[ 42 ]
[ 44 ]
2024-11-18T19:03:20.430505+00:00
1,479,837,323,000
8b6ca0ca4a6db11b86d863f6df10c13511f405a4
3
{ "blob_id": "8b6ca0ca4a6db11b86d863f6df10c13511f405a4", "branch_name": "refs/heads/master", "committer_date": 1479837323000, "content_id": "8b4f384d9c04d8aab09fe54a8db5b4bfc4e80af2", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "12d9710b8bb659a11f399a71e05e99ccd5e847d1", "extension": "p...
3.3125
stackv2
#!/usr/bin/env python """ This script extracts all URLs from a supplied PDF file. The script finds all URLs by walking the PDF tree and looking for all URI references, as specified in Section 8.5 of PDF v1.7: <</Type/Action/S/URI/URI/<dest> For Example: <</Type/Action/S/URI/URI(http://www.google.com/) >> """ impor...
94
28.18
128
17
663
python
[{"finding_id": "codeql_py/overly-large-range_e6e1c37f78910b63_ad9d150d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 80 ]
[ null ]
[ 60 ]
[ 63 ]
2024-11-18T19:03:23.427305+00:00
1,421,928,225,000
9cf8b9d0301898a48b3b41f40d3647e382ae7a4b
3
{ "blob_id": "9cf8b9d0301898a48b3b41f40d3647e382ae7a4b", "branch_name": "refs/heads/master", "committer_date": 1421928225000, "content_id": "f29374a31e9b5cac166861306f88d91b16d66a9a", "detected_licenses": [ "MIT" ], "directory_id": "2de15ddf4cb1b5a80d4a95488bde362248fe75e6", "extension": "py", "fi...
2.71875
stackv2
# encoding: UTF-8 from utils.whereami import realdir import os, re import os.path # FileSystem Database driver... # Simple wrapper that reads and writes confgurations in a fashion that bash can # easily read the values later. class RowDoesNotExistError(Exception): "Exception triggered when trying to get a row whi...
230
28.93
144
19
1,554
python
[{"finding_id": "codeql_py/overly-large-range_3af61727be209b57_68d934f7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class." ]
[ 72 ]
[ null ]
[ 27 ]
[ 30 ]
2024-11-18T19:03:27.682708+00:00
1,630,253,847,000
29404e61e3d9d123040a8f94606f9d07c50d4b46
3
{ "blob_id": "29404e61e3d9d123040a8f94606f9d07c50d4b46", "branch_name": "refs/heads/main", "committer_date": 1630253847000, "content_id": "b08d9113e4f0f0fe5798652242bc94e0527e5ff3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0e6258cbc71c1c3739821bd985997fb6499fb287", "extension": "py", ...
2.734375
stackv2
#pip install datetime import time import platform import getpass machine=str(platform.node()) architecture=str(platform.architecture()) opsys=str(platform.system()) os_vers=str(platform.release()) proces=str(platform.processor()) py_vers=str(platform.python_version()) a='\n' a1='Machine: ' a2='Architecture: ' a3='OS: '...
22
30.73
88
23
207
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c6649edc49ace685_a0e85baa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 22 ]
[ null ]
[ 7 ]
[ 83 ]
2024-11-18T19:03:39.325785+00:00
1,522,717,709,000
cfcee72d5c2179bf86339d698091b4b2febc8a3d
3
{ "blob_id": "cfcee72d5c2179bf86339d698091b4b2febc8a3d", "branch_name": "refs/heads/master", "committer_date": 1522717709000, "content_id": "1d32d037bbfb16f762c493ab0b092ca02ba90e98", "detected_licenses": [ "MIT" ], "directory_id": "cdbe873293b8f4046d6c2d703526b1c2333a0cff", "extension": "py", "fi...
2.71875
stackv2
#------------------------------------------------------------------------------- # Name: Event Factory # Purpose: Contains factories for creating appropriate events. # # Author: tetrisd #------------------------------------------------------------------------------- from . import event as evt import re...
106
27.21
96
17
630
python
[{"finding_id": "codeql_py/overly-large-range_54292b8430198a73_ff991d1b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 93 ]
[ null ]
[ 51 ]
[ 54 ]
2024-11-18T19:28:37.182900+00:00
1,590,406,024,000
40657406abb5714c9eccc93e14efae6353a6c161
3
{ "blob_id": "40657406abb5714c9eccc93e14efae6353a6c161", "branch_name": "refs/heads/master", "committer_date": 1590406024000, "content_id": "cb27749e345413f8a0f6ee4bf99cf95207bc6b54", "detected_licenses": [ "MIT" ], "directory_id": "e9165ab1ae366130e313a9e748499a672e60fa31", "extension": "py", "fi...
2.515625
stackv2
import os import sys import re from shutil import copy from collections import OrderedDict import imghdr from jinja2 import Environment, FileSystemLoader, Template from slugify import slugify from yaml import load, dump from pathlib import Path home = str(Path.home()) DEBUG = True COPY = True # whether to copy image f...
151
34.58
115
27
1,209
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4a8509bcfc6b6556_38f83678", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 139 ]
[ null ]
[ 11 ]
[ 116 ]
2024-11-18T19:28:44.747890+00:00
1,601,677,106,000
20967401981c66c7466699656b43855e597e4b56
3
{ "blob_id": "20967401981c66c7466699656b43855e597e4b56", "branch_name": "refs/heads/master", "committer_date": 1601677106000, "content_id": "fc7e600ef0b586690dec87c90a20ba7bf498d5ab", "detected_licenses": [ "MIT" ], "directory_id": "ba40ad5865bb3e8c09ef32ace6f452162aacc8c9", "extension": "py", "fi...
2.65625
stackv2
import re def enum(*sequential, **named): enums = dict(zip(sequential, range(len(sequential))), **named) from_string = dict((key, value) for key, value in enums.items()) from_int = dict((value, key) for key, value in enums.items()) enums['from_string'] = from_string enums['from_int'] = from_int ...
193
30.56
79
19
1,467
python
[{"finding_id": "codeql_py/redos_3476b207032ec810_de57ab50", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '|\\n-|' and containing many repet...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '|\\n-|' and containing many repetitions of '---|'.", "This part of the regular expression may cause exponential backtracking on strings starting with '|\\n-|-' and containing many repetitions of ':-|-'." ]
[ 19, 19 ]
[ null, null ]
[ 51, 53 ]
[ 53, 55 ]
2024-11-18T19:28:54.408661+00:00
1,634,674,014,000
75bb72b5d654737fba8bb1ac2dfee42c5eb82197
3
{ "blob_id": "75bb72b5d654737fba8bb1ac2dfee42c5eb82197", "branch_name": "refs/heads/main", "committer_date": 1634674014000, "content_id": "748fe4cc1ba75cb8c677e60d8901c9eafaad4c24", "detected_licenses": [ "MIT" ], "directory_id": "7fef9f162f7be5829482ac8ac520ce20d5f8f99d", "extension": "py", "file...
3.265625
stackv2
from collections import deque pizza_orders = deque([int(x) for x in input().split(", ")]) employees = [int(x) for x in input().split(", ")] orders_count = 0 while pizza_orders and employees: while pizza_orders and (pizza_orders[0] <= 0 or pizza_orders[0] > 10): pizza_orders.popleft() if not pizza_or...
44
27.39
74
16
293
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2fc64fbae226ed0e_0d0abfa1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 37, 40 ]
[ 38, null ]
[ 11, 15 ]
[ 47, 69 ]
2024-11-18T19:39:46.311126+00:00
1,614,592,078,000
cb58339a62292a1dc70563e19ddccec51d4767ae
3
{ "blob_id": "cb58339a62292a1dc70563e19ddccec51d4767ae", "branch_name": "refs/heads/main", "committer_date": 1614592078000, "content_id": "3f009f5d5a6ed89bd449700712c09ba61d7da60c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "892c91fea073ae30950d538d5268e1c2ce84a52b", "extension": "py", ...
2.875
stackv2
import argparse import glob import json from pathlib import Path from types import SimpleNamespace from typing import List from flask import Flask, render_template def parse_args() -> SimpleNamespace: parser: argparse.ArgumentParser = argparse.ArgumentParser(description="Flask server to view hanabi games.") ...
55
38.93
111
15
455
python
[{"finding_id": "codeql_py/reflective-xss_00eebb5dca429ad4_ff8fe89d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
6
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provide...
[ 42, 44, 49, 41, 43, 46 ]
[ null, null, null, null, null, null ]
[ 16, 16, 16, 12, 12, 10 ]
[ 72, 71, 66, 16, 16, 14 ]
2024-11-18T19:39:49.811883+00:00
1,499,964,840,000
dcefc38c0e56b73fc3c699f9e987ab32125e4dec
3
{ "blob_id": "dcefc38c0e56b73fc3c699f9e987ab32125e4dec", "branch_name": "refs/heads/master", "committer_date": 1499964840000, "content_id": "4d0bb709c256acf699b77ccea4c76961b75e0582", "detected_licenses": [ "MIT" ], "directory_id": "def6ada035a86750a19dce65aa1d1a058988aea1", "extension": "py", "fi...
2.953125
stackv2
# -*- coding:utf8 -*- """HTTP requests module.""" from __future__ import unicode_literals import hmac import hashlib from base64 import b64encode def build_signature(method, path, api_key, secret_key, expires): """Build API request signature. :param method: request method :type method: basestring :pa...
29
28.66
69
13
219
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_96fd4f4cc33b4565_7401389c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 28 ]
[ null ]
[ 42 ]
[ 53 ]
2024-11-18T19:39:53.689646+00:00
1,636,828,330,000
10c7f1cc02f54274d2d3c3dda74596f52a981297
3
{ "blob_id": "10c7f1cc02f54274d2d3c3dda74596f52a981297", "branch_name": "refs/heads/main", "committer_date": 1636828330000, "content_id": "83e3ead6c0c5556e3b47f4b9db90e5e154e66af2", "detected_licenses": [ "MIT" ], "directory_id": "e0db3dae526152d990e9fedabbe48c57d781690e", "extension": "py", "file...
2.625
stackv2
import requests import re BASE_URL = "https://en.wikichip.org/wiki/amd" def parse_codename(cpu_name): """ Queries the AMD section from wikichip, parses the contents, and looks for the codename/µarch. """ formatted = re.sub( r"(\d{1,2}?(-Core\s?)?(Processor))", "", cpu_name.replace("AMD",...
76
25.04
108
19
533
python
[{"finding_id": "codeql_py/redos_83c7aeecf7231743_01f4f30f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<ahref=\"/wiki/amd/cores/' and co...
6
true
[ "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos", "py/redos", "py/redos", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<ahref=\"/wiki/amd/cores/' and containing many repetitions of '0'.", "This part of the regular expression may cause exponential backtracking on strings starting with '<ahref=\"/wiki/amd/cores/a' and containing many r...
[ 43, 43, 54, 54, 66, 66 ]
[ null, null, null, null, null, null ]
[ 52, 63, 65, 76, 49, 60 ]
[ 60, 72, 73, 85, 57, 69 ]
2024-11-18T19:40:03.031642+00:00
1,587,721,921,000
a41fb62af3df319adefa6f85543a34e8fc01fdfa
4
{ "blob_id": "a41fb62af3df319adefa6f85543a34e8fc01fdfa", "branch_name": "refs/heads/master", "committer_date": 1587721921000, "content_id": "b8a9e501de4069a86187575f65b6c3e474d61476", "detected_licenses": [ "MIT" ], "directory_id": "ca7c4b6c3b51452f669bab937c441e5970010aa0", "extension": "py", "fi...
3.59375
stackv2
import itertools import time import string import sys with open('passphrases.txt','r') as f_open: data = f_open.read() print('Thnaks You For Using It, If you Like it, Please contribute!') time.sleep(3) pas = str(input('What is your password > ')) def guess_password(real): chars = string.ascii_lowercase + stri...
24
27.71
75
13
163
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c9cd7e9856fb6dde_97c525a1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 24 ]
[ null ]
[ 7 ]
[ 26 ]
2024-11-18T20:18:06.063169+00:00
1,611,615,238,000
3d414702dd04efabd609ae643fea2df8c004eb13
3
{ "blob_id": "3d414702dd04efabd609ae643fea2df8c004eb13", "branch_name": "refs/heads/main", "committer_date": 1611615238000, "content_id": "c8112f3966f56a02b757e35b60417223e447fb77", "detected_licenses": [ "MIT" ], "directory_id": "38914ce315357c9a6bffe6aa61638333f43d29b7", "extension": "py", "file...
2.515625
stackv2
#!/usr/bin/env python3 import json import sys import time from io import BytesIO from typing import List, Tuple import cv2 import requests as rq import urllib3 from PIL import Image def sss_login(address: str, account: str, passwd: str, otp: str = '') -> rq.sessions.Session: '''Takes a LoginInfo o...
139
30.65
79
15
1,066
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3b2aca30e09e92d4_450a893f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 34, 41, 32 ]
[ null, null, null ]
[ 37, 19, 24 ]
[ 50, 32, 63 ]
2024-11-18T20:18:17.832469+00:00
1,571,740,215,000
68ece0feff9e1a7de0770c68ab84338d029c3094
3
{ "blob_id": "68ece0feff9e1a7de0770c68ab84338d029c3094", "branch_name": "refs/heads/master", "committer_date": 1571740215000, "content_id": "d311c95510ecac2ffb56f7f8f88b5f9b1b1520ef", "detected_licenses": [ "MIT" ], "directory_id": "445a0b087e76f9c7dc5ae67840fe842cf85e41d7", "extension": "py", "fi...
2.578125
stackv2
import asyncio import functools import logging import pathlib import typing from aiohttp import web from player import Playlist, Player logger = logging.getLogger(__name__) def api_endpoint( handler: typing.Callable[[web.Request], typing.Awaitable[web.Response]] ) -> typing.Callable[[web.Request], typing.Awai...
152
32.01
87
18
1,072
python
[{"finding_id": "codeql_py/log-injection_406edd3a654d4826_e8f3194b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 26 ]
[ null ]
[ 26 ]
[ 55 ]
2024-11-18T20:18:23.097546+00:00
1,620,995,596,000
cfe2a7478fc5b6bb48699d0e49b9d55c6432d299
3
{ "blob_id": "cfe2a7478fc5b6bb48699d0e49b9d55c6432d299", "branch_name": "refs/heads/master", "committer_date": 1620995596000, "content_id": "8de502881d5a84c9ab5f934a94a6a63be2cfaf86", "detected_licenses": [ "MIT" ], "directory_id": "f5ddc12ba12168ec033d6914af3c4308c4d1bf90", "extension": "py", "fi...
2.546875
stackv2
import os import wget import json import errno import shutil import socket import tarfile import logging import urllib.request DISCLAIMER = ( "\nDISCLAIMER: PAGnol is made available under the MIT licence: " "By downloading its models/assets, you agree with the terms of the licence agreement.\n" "Under no c...
246
30.3
92
19
1,703
python
[{"finding_id": "codeql_py/tarslip_2b4e58f06e3e9173_e23309a0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 149 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T20:18:32.751669+00:00
1,450,937,331,000
7f2040b3a284c33d989735e6f2de14f6e93223dd
3
{ "blob_id": "7f2040b3a284c33d989735e6f2de14f6e93223dd", "branch_name": "refs/heads/master", "committer_date": 1450937331000, "content_id": "3648cff391f5dddc0e7c56ee39bd2242acf79614", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4c8f78c1042a2117cee33072ec07b01144fa2e4b", "extension": "p...
3
stackv2
""" Send message by a phone number. """ import datetime import requests import hashlib VER_ACCOUNT_SID = "8a70971adf5ba2d4598193cc03fcbaa2" VER_AUTH_TOKEN = "7c7c4e5d324b7efbf75db740fdf6a253" VER_TEM_ID = "12750" VER_APP_ID = "71ca63be653c45129a819964265eccec" VER_URL = "https://www.ucpaas.com/maap/sms/code" VER_VERSI...
64
21.34
74
12
453
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6f1736db55966116_6e9e9cf0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
2
true
[ "CWE-327", "CWE-295" ]
[ "py/weak-sensitive-data-hashing", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 37, 51 ]
[ null, null ]
[ 14, 16 ]
[ 61, 70 ]
2024-11-18T20:18:45.812726+00:00
1,545,070,995,000
33d90c793a150d1c469047e0d0d8d45463ad4c75
4
{ "blob_id": "33d90c793a150d1c469047e0d0d8d45463ad4c75", "branch_name": "refs/heads/master", "committer_date": 1545070995000, "content_id": "0f2c08d715505d51123c89203521c9afa0ce20d6", "detected_licenses": [ "MIT" ], "directory_id": "c6b9b3f3d74572bd32ab38b7502122a4dfdca5da", "extension": "py", "fi...
3.796875
stackv2
''' 1 datetime:处理时间和日期的标准库 datetime是模块,还包含一个datetime类 datetime类可获取指定时间日期 timestamp 时间戳 1970.1.1 00:00 datetime和timestamp转换:fromtiemstamp()方法 str转换为datetime:datetime.strptime() 反之 datetime.strftime() datetime加减 2 collections:集合模块 namedtuple:定义坐标,可根据属性来引用 deque: 实现高效的插入和...
302
21.56
80
19
2,410
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_94c278bb9cce90f4_21c6601e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 211, 228 ]
[ null, null ]
[ 15, 24 ]
[ 39, 41 ]
2024-11-18T20:18:56.556807+00:00
1,588,760,471,000
e87509c7771ff2f3a6a8610761cab991153c5401
2
{ "blob_id": "e87509c7771ff2f3a6a8610761cab991153c5401", "branch_name": "refs/heads/master", "committer_date": 1588760471000, "content_id": "2f134d16ba3239da514bf0c9f6ab2b9be6defbe2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7d639c8a9842fd1cba999079bac8b1dec24c33ab", "extension": "py"...
2.3125
stackv2
# coding: utf-8 import os import re from utils.tool import Tools __author__ = 'deff' from scanner.base import BaseScanner import json from utils.sdkinfo import sdkinfo from config import config # api审计 # 0. 隐私信息api :手机号/imei/imsi/mac/android id/gps/通讯录/应用程序列表/网页浏览记录(静态检测,后续动态可以进行hook对应函数检测) # 0.1 http url链接检测 # 1....
195
37.11
129
22
1,798
python
[{"finding_id": "codeql_py/overly-large-range_ad87b902c65448b4_4848cef4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 74 ]
[ null ]
[ 62 ]
[ 65 ]
2024-11-18T20:29:47.410431+00:00
1,616,426,391,000
e941d7785a9b27234d12e5c3c21376c50fc8a226
3
{ "blob_id": "e941d7785a9b27234d12e5c3c21376c50fc8a226", "branch_name": "refs/heads/main", "committer_date": 1616426391000, "content_id": "fd8e7b126ad958a28ab4149071c7276867b1613e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8f2be6cb532624e437d0061dfcdbeb085bc33eff", "extension": "py", ...
2.796875
stackv2
from jinja2 import Environment, BaseLoader from datetime import datetime from dateutil.relativedelta import relativedelta class Jinja: @property def env(self): try: return self._env except AttributeError: self._env = Environment(loader=BaseLoader()) self.se...
42
31.88
79
17
308
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0e0ad30a1230aa6e_e6e3e640", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 25 ]
[ 57 ]
2024-11-18T20:51:29.570863+00:00
1,692,828,071,000
4fa09a99e08c1fd18446353409d12514a4ea9e66
2
{ "blob_id": "4fa09a99e08c1fd18446353409d12514a4ea9e66", "branch_name": "refs/heads/main", "committer_date": 1692828071000, "content_id": "b45f5f3bf9af60802b69f880b3dbebc7068b08b4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a3d6556180e74af7b555f8d47d3fea55b94bcbda", "extension": "py"...
2.453125
stackv2
#!/usr/bin/env python3 # Copyright 2019 The Chromium Authors # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. """Wraps an executable and any provided arguments into an executable script.""" import argparse import os import sys import textwrap # The bash template ...
251
31.98
96
14
1,980
python
[{"finding_id": "codeql_py/overly-permissive-file_940b0c34301ff8a8_acce1abb", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group readable." ]
[ 217 ]
[ null ]
[ 3 ]
[ 39 ]
2024-11-18T19:07:25.248453+00:00
1,569,857,706,000
ab884bc53aea45c122b91e204439233bef170961
3
{ "blob_id": "ab884bc53aea45c122b91e204439233bef170961", "branch_name": "refs/heads/master", "committer_date": 1569857706000, "content_id": "0701e88dee26723a7fbb9a2fba19d584368f467b", "detected_licenses": [ "MIT" ], "directory_id": "d46f52b0558b88dd109a7447c4608fc1f8e7eb2f", "extension": "py", "fi...
2.515625
stackv2
# coding: utf-8 import logging from flask import Blueprint, jsonify, abort, g from backend.business.volunteers import VolunteerDomain from backend.business.exceptions import DataNotFoundException logger = logging.getLogger(__name__) blueprint = Blueprint('Volunteer', __name__) @blueprint.route('/<string:vk_id>/jo...
36
26.83
77
12
242
python
[{"finding_id": "codeql_py/log-injection_07084d87d4d6adbc_00f51d93", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)." ]
[ 16 ]
[ null ]
[ 17 ]
[ 53 ]
2024-11-18T19:07:26.402075+00:00
1,520,201,224,000
91bcba5687676464efc54940fd32338e34ef0482
2
{ "blob_id": "91bcba5687676464efc54940fd32338e34ef0482", "branch_name": "refs/heads/master", "committer_date": 1520201224000, "content_id": "d4a682fb1003881f9687e14f38a4ae584adda6e7", "detected_licenses": [ "MIT" ], "directory_id": "55aa3ecdc1f14232354292babeb837feed3f2802", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 from flask import Flask, request, jsonify, redirect, url_for, render_template, send_file, Response from werkzeug.datastructures import Headers from flask_cors import CORS, cross_origin from flask_compress import Compress import os app = Flask(__name__) CORS(app) Compress(app) Port = 80 imgDir ...
63
23.25
98
16
386
python
[{"finding_id": "codeql_py/path-injection_bc4fda04219a8a84_331b3dbd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 55 ]
[ null ]
[ 22 ]
[ 30 ]
2024-11-18T19:07:33.384550+00:00
1,615,452,574,000
434062456dfd2ab354ab816445b6d0daf2462b8d
3
{ "blob_id": "434062456dfd2ab354ab816445b6d0daf2462b8d", "branch_name": "refs/heads/master", "committer_date": 1615452574000, "content_id": "03aa5ae299d2531dad4fd3287dc54b2fc453709f", "detected_licenses": [ "MIT" ], "directory_id": "01f57a90bf05c718e0249d2403cf748cd57a31c6", "extension": "py", "fi...
2.71875
stackv2
""" Made by Dhruman Gupta """ import sys import base64 import os.path from selenium import webdriver from selenium.webdriver.support.ui import WebDriverWait from selenium.webdriver.support import expected_conditions as EC from selenium.webdriver.common.by import By from selenium.common.exceptions import NoSuchElementE...
165
31.22
117
14
1,307
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6a0911a635aeba87_4a589882", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 133, 120, 124 ]
[ null, null, null ]
[ 16, 11, 15 ]
[ 31, 73, 77 ]
2024-11-18T19:07:48.259135+00:00
1,440,646,121,000
0f0452b41449c11529899b767d1550baffb52eb5
3
{ "blob_id": "0f0452b41449c11529899b767d1550baffb52eb5", "branch_name": "refs/heads/master", "committer_date": 1440646121000, "content_id": "77b5429d2b92f63304f6fcc95b86a5bdf5330d78", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5dd30be12cad26d76b8dde4b98fe1cd7b78b1ce5", "extension": "py"...
2.609375
stackv2
from flask import Flask from flask import request import requests import re import json import sys app = Flask(__name__) @app.route('/search', methods=['POST', 'GET']) def hello_world(): key=request.args.get('key', '') page=request.args.get('page', '') r=requests.get("https://www.google.com/search?q="+key+'...
22
28.64
90
17
197
python
[{"finding_id": "codeql_py/polynomial-redos_2799b50f257744dd_ed53a00a", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
3
true
[ "CWE-1333", "CWE-079", "CWE-918" ]
[ "py/polynomial-redos", "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'url?q=' and with many repetitions of 'url?q=a'.\nThis [regular expression](3) that depends on a [user-provided value](2) may run slow on strings starting with 'url?q=&amp' and with many repetitions of '&a...
[ 13, 20, 12 ]
[ null, null, null ]
[ 53, 12, 7 ]
[ 59, 27, 91 ]
2024-11-18T19:18:48.160699+00:00
1,585,610,014,000
58c8b688d0c1e1e448b04e001bcfa59acc980025
2
{ "blob_id": "58c8b688d0c1e1e448b04e001bcfa59acc980025", "branch_name": "refs/heads/master", "committer_date": 1585610014000, "content_id": "8eb501a807b39ea26d14d56619fc1990fa6b2acd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "43dea3ac2f12cad95c2b94a5f037c4edd2ac3679", "extension": "py"...
2.453125
stackv2
# pylint: disable=too-many-instance-attributes """Delete Vessel""" # coding: utf-8 # pylint: disable=bare-except import os import json import subprocess from configparser import ConfigParser import requests from flask import request from library.common import Common from library.couch_queries import Queries from libr...
160
28.54
96
18
1,046
python
[{"finding_id": "codeql_py/command-line-injection_f7283cb7ae169cfb_963c6182", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 153 ]
[ null ]
[ 36 ]
[ 39 ]
2024-11-18T19:18:59.641373+00:00
1,615,150,639,000
01c6b99a9bc10efc2d2c2119cfb67e5c0375d9ae
3
{ "blob_id": "01c6b99a9bc10efc2d2c2119cfb67e5c0375d9ae", "branch_name": "refs/heads/main", "committer_date": 1615150639000, "content_id": "c6c9cace80a0214cb0cdc81d8cc72dd9918d84db", "detected_licenses": [ "MIT" ], "directory_id": "c41e9094cf815d22bf20d122e689238d659f1818", "extension": "py", "file...
2.703125
stackv2
""" Groundswell is an util module for continuous inspection of a hashtag """ import numpy as np import pickle import datetime as dt import os import random import time from instagramy import InstagramHashTag from nedima.utils import env_setup ############################################## ##### KNOWN POST IDENTIFI...
247
43.49
164
17
2,527
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_066771419b429bd6_d0026221", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.", "This expression logs [sensitive data (secret)](...
[ 219, 225 ]
[ null, null ]
[ 15, 15 ]
[ 103, 106 ]
2024-11-18T19:29:37.316500+00:00
1,432,217,921,000
ee100a63ddc5436d0565ac1ebaf76086f76b7dfb
2
{ "blob_id": "ee100a63ddc5436d0565ac1ebaf76086f76b7dfb", "branch_name": "refs/heads/master", "committer_date": 1432217921000, "content_id": "3ac0f3bb3e2daf74a44a8035138c0aa479eebf8a", "detected_licenses": [ "MIT" ], "directory_id": "187d4f4c36c72578bb33f846a905566095e93435", "extension": "py", "fi...
2.375
stackv2
import tornado.web import tornado.ioloop import hashlib from vlang.parser import parserRaw from tornado.concurrent import run_on_executor from concurrent.futures import ThreadPoolExecutor maxWorks = 10 # 启动服务器 def start(mainMenu, settings): global maxWorks maxWorks = settings.get('maxWorks', 10) applicatio...
71
30.8
95
15
519
python
[{"finding_id": "codeql_py/reflective-xss_9576d0377d58fd95_96f6a6f7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 28 ]
[ 35 ]
2024-11-18T19:29:45.396058+00:00
1,618,218,055,000
5fa7a29f2529f677acb8877b4f7256d29e3ad575
2
{ "blob_id": "5fa7a29f2529f677acb8877b4f7256d29e3ad575", "branch_name": "refs/heads/master", "committer_date": 1618218055000, "content_id": "6ec7c5dd99ef543012ef31c437e787734acc00dc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4c0feccaec9c2b1d9124c43fd264c5d723a6d0a2", "extension": "py"...
2.375
stackv2
import logging as log import urllib.parse import os import requests from requests.auth import HTTPBasicAuth HNDL_RESOLVE_PREFIX = 'http://hdl.handle.net/' HNDL_CERT_FILE = '/hps-b2handle/certs/cert.pem' HNDL_KEY_FILE = '/hps-b2handle/certs/privkey.pem' def resolve_handle(hndl, serviceProperties): return 'Not impl...
95
35.24
85
18
752
python
[{"finding_id": "codeql_py/request-without-cert-validation_448537e36929163e_b945c76a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 66 ]
[ 67 ]
[ 17 ]
[ 72 ]
2024-11-18T19:29:55.188028+00:00
1,484,502,514,000
7bff1550fd2692d9b143afc405983295a9ddc9ba
2
{ "blob_id": "7bff1550fd2692d9b143afc405983295a9ddc9ba", "branch_name": "refs/heads/master", "committer_date": 1484502514000, "content_id": "909c91c51ad86969ed51c674dc5cb831970e156e", "detected_licenses": [ "MIT" ], "directory_id": "05e45b08595959a7b8ab9303704749f5306aa493", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python import os import re import pygal import json import requests from bson import json_util import logging from pymongo import MongoClient from datetime import datetime from datetime import timedelta logging.basicConfig(filename='{0}weather.log'.format(os.environ['OPENSHIFT_PYTHON_LOG_DIR']), ...
186
30.11
100
19
1,457
python
[{"finding_id": "codeql_py/log-injection_35f75228008e159e_367896c0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 33 ]
[ null ]
[ 23 ]
[ 27 ]
2024-11-18T19:58:06.371458+00:00
1,591,464,394,000
732f0376db9f588a7afd043f6d4430d9985f7185
2
{ "blob_id": "732f0376db9f588a7afd043f6d4430d9985f7185", "branch_name": "refs/heads/master", "committer_date": 1591464394000, "content_id": "c179cc711e70ee594a04d3ffef0cbbb4a79e68e4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fc00010c645432052ceff7b7fcbcaa1cdda79cb7", "extension": "py"...
2.421875
stackv2
from .face_age_gender_recognition.face_age_gender_recognition import FaceAgeGenderRecognition from .emotion_recognition.emotion_recognition import EmotionRecognition from .facial_landmark.facial_landmark import FacialLandmark from .head_pose_estimation.head_pose_estimation import HedPoseEstimation __model_factory = { ...
29
34.9
103
12
242
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eeb9522606c03e52_1376539e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 29 ]
[ null ]
[ 11 ]
[ 39 ]