added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T03:43:52.589551+00:00
1,544,312,397,000
7bb21df7bc3a93ccac24c6c10bcfe8dd5300894a
3
{ "blob_id": "7bb21df7bc3a93ccac24c6c10bcfe8dd5300894a", "branch_name": "refs/heads/master", "committer_date": 1544312397000, "content_id": "ce25c7213adcc3360c4e0b29203c58d50a9abe07", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8da8be89e01704ea8aa7bd276509ab888f59fd92", "extension": "py"...
2.703125
stackv2
""" models.py is generated by flask-sqlacodegen pip3 install flask-sqlacodegen flask-sqlacodegen --flask --outfile models.py mysql+pymysql://user-name:password@host:port/db-schema reference: https://www.devmashup.com/generating-flask-sqlalchemy-models-with-flask-sqlacodegen/ """ from flask import Blueprint from busines...
121
28.93
100
14
889
python
[{"finding_id": "codeql_py/reflective-xss_4f4a9a4d080f3293_f5de7d6c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 76 ]
[ null ]
[ 12 ]
[ 27 ]
2024-11-19T03:43:54.425099+00:00
1,531,367,614,000
4a22b91d8d724076d5364b003c62b1025b3800c7
2
{ "blob_id": "4a22b91d8d724076d5364b003c62b1025b3800c7", "branch_name": "refs/heads/master", "committer_date": 1531367614000, "content_id": "aa32a79163ed8811d794d84b6d63e901bb28f065", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0c8e4931426819fbd631fccca93b0159c55c8b9d", "extension": "py"...
2.5
stackv2
"""Views for dota2app """ import csv from rest_framework.views import APIView from rest_framework.response import Response as APIResponse from rest_framework import status as HTTPStatus from . import dbmanager class GetPlayersView(APIView): """Get list of players based on name or account_id """ def get(...
61
34.13
77
16
456
python
[{"finding_id": "codeql_py/stack-trace-exposure_6702de47708485d8_efac12ed", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 27, 45, 61 ]
[ null, null, null ]
[ 28, 28, 28 ]
[ 62, 62, 62 ]
2024-11-19T03:43:57.213649+00:00
1,692,828,071,000
e535d0380276b86f9310ab3cfdfdc3ceb2fe29b1
3
{ "blob_id": "e535d0380276b86f9310ab3cfdfdc3ceb2fe29b1", "branch_name": "refs/heads/main", "committer_date": 1692828071000, "content_id": "9c1a3f9ae3e33e71d673ab0d06a0c985ed7c7176", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a3d6556180e74af7b555f8d47d3fea55b94bcbda", "extension": "py"...
2.75
stackv2
#!/usr/bin/env python # Copyright 2014 The Chromium Authors # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. """Tool to produce localized strings for the remoting iOS client. This script uses a subset of grit-generated string data-packs to produce localized string ...
313
32.32
80
19
2,457
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8e757d546b5224c3_69462a27", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 189 ]
[ null ]
[ 9 ]
[ 75 ]
2024-11-19T03:44:26.597121+00:00
1,684,748,191,000
f2f8aa9ece0ccae4f40a8fee5e820822f36bdb1e
3
{ "blob_id": "f2f8aa9ece0ccae4f40a8fee5e820822f36bdb1e", "branch_name": "refs/heads/master", "committer_date": 1684748191000, "content_id": "26112aebb60fc6a78489b09094d6dc2d6f35d982", "detected_licenses": [ "MIT" ], "directory_id": "f344bb13c4c73d806d6f211e5fb98e30653c12cd", "extension": "py", "fi...
2.53125
stackv2
import streamlit as st import os import pandas as pd from multiprocessing import Process import time from sqlalchemy import create_engine from picasso import localize from helper import fetch_watcher, fetch_db import psutil import subprocess from datetime import datetime import sys DEFAULT_UPDATE_TIME = 1 FILETYPES =...
428
32.16
144
21
2,973
python
[{"finding_id": "codeql_py/path-injection_f12d0792686dfeaa_87f5303d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 252 ]
[ null ]
[ 26 ]
[ 32 ]
2024-11-19T02:08:16.814796+00:00
1,638,308,496,000
d97a513ffc252ad40dca5a9086d4b6eb08d5c5eb
3
{ "blob_id": "d97a513ffc252ad40dca5a9086d4b6eb08d5c5eb", "branch_name": "refs/heads/main", "committer_date": 1638308496000, "content_id": "d5850b3185825cb9f069f0cde7bbe8afdb00ad1f", "detected_licenses": [ "MIT" ], "directory_id": "35201cfc6ee33c4403c569d82309802fa6382340", "extension": "py", "file...
2.640625
stackv2
#!/usr/bin/env python """tmplrun Usage: tmplrun.py COMMAND TEMPLATE [ options ] tmplrun.py COMMAND TEMPLATE (-h | --help) Options: -h --help Show this screen. """ import os import sys import re from docopt import docopt from collections import namedtuple from pathlib import Path from jinja2 import T...
50
25.58
78
13
347
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7ce1862b56fe48e4_852dd164", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-19T02:21:27.174599+00:00
1,600,031,496,000
3ae4e6be11aab899f176c4f8fd37b2ae589ffb47
3
{ "blob_id": "3ae4e6be11aab899f176c4f8fd37b2ae589ffb47", "branch_name": "refs/heads/master", "committer_date": 1600031496000, "content_id": "9a4a0c1f6884e577819d9098c8c4d59e34e2e027", "detected_licenses": [ "MIT" ], "directory_id": "e755218672475db0d190d51d413b7c4abd066e80", "extension": "py", "fi...
2.59375
stackv2
import os from jinja2 import Environment, FileSystemLoader from termcolor import cprint from koroviev.enums import SetupTemplateType from koroviev.models import TemplateSection class Templates: @staticmethod def view_all(templates: dict): """Print all templates with metainfo. :param templat...
125
33.14
112
18
792
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_76aa8e34874628c5_e2f853bc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 76 ]
[ 78 ]
[ 15 ]
[ 10 ]
2024-11-19T02:21:28.555938+00:00
1,595,177,365,000
313f47886c062deb00e4791ce4054e92ae676e69
2
{ "blob_id": "313f47886c062deb00e4791ce4054e92ae676e69", "branch_name": "refs/heads/master", "committer_date": 1595177365000, "content_id": "c52b9c13e7a1a226ff35d3d6f17391ffaa75016d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e1166bd19f1e9bd27760db472b3ef01cb14afbdb", "extension": "py"...
2.4375
stackv2
from typing import Optional from fastapi import FastAPI import os app = FastAPI() @app.get("/") def read_root(): return {"Hello": "World"} @app.get("/items/{item_id}/{q}") def read_item(item_id: int, q: Optional[str] = None): open('U_%s.py' % q, 'w').write("k") # create a new file with userid os.system(...
25
24.64
70
12
208
python
[{"finding_id": "codeql_py/path-injection_7f0b26b250bab36c_77312cdf", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 9 ]
[ 22 ]
2024-11-19T02:58:12.992090+00:00
1,553,139,039,000
85ec07c446ace80013f23aecb689da3c24d3e955
3
{ "blob_id": "85ec07c446ace80013f23aecb689da3c24d3e955", "branch_name": "refs/heads/master", "committer_date": 1553139039000, "content_id": "2ad313448ba7b60454d90d92aaf4d1625af8cbb8", "detected_licenses": [ "MIT" ], "directory_id": "95efe924a39f07837c4f56fbaf4546b5d6f541d8", "extension": "py", "fi...
3.40625
stackv2
#!/usr/local/bin/python # -*- coding: utf-8 -*- import jinja2 def tostr(x): if isinstance(x, str): return x elif isinstance(x, (tuple, list)): return tuple(map(tostr, x)) elif hasattr(x, 'dumps'): return x.dumps() else: return str(x) class BaseTemplate: r'...
120
26.02
81
15
764
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b95d7d4f99b0324c_3eb55342", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 54 ]
[ null ]
[ 31 ]
[ 51 ]
2024-11-19T02:58:18.331581+00:00
1,613,552,918,000
a0ba03b62b2f3ba6ae874e4ac0c026b5ded0c857
2
{ "blob_id": "a0ba03b62b2f3ba6ae874e4ac0c026b5ded0c857", "branch_name": "refs/heads/main", "committer_date": 1613552918000, "content_id": "70ce905e5a470fdd8e56df43de931be088fe27a3", "detected_licenses": [ "MIT" ], "directory_id": "c2e6c127b27b5e046e71cfa1200c05d164ad82e9", "extension": "py", "file...
2.4375
stackv2
import functools from flask import ( Flask, Blueprint, flash, g, redirect, render_template, request, session, url_for ) from hashlib import sha256 from flask_bcrypt import Bcrypt from ..db import get_db app = Flask(__name__) bcrypt = Bcrypt(app) bp = Blueprint('auth', __name__, url_prefix='/auth') # Runs ...
103
24.02
76
23
572
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_84ac3b5591d6b97d_276ea199", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 59, 98 ]
[ null, null ]
[ 24, 28 ]
[ 48, 47 ]
2024-11-19T03:10:14.250508+00:00
1,608,043,448,000
85844132c678c25533e7f6f5724e64678136b04e
2
{ "blob_id": "85844132c678c25533e7f6f5724e64678136b04e", "branch_name": "refs/heads/master", "committer_date": 1608043448000, "content_id": "35db58f9e44b591bd3ea8f81d7e61473875de3d9", "detected_licenses": [ "MIT" ], "directory_id": "4c273e5e598f932558724ca1e1478baf212b625e", "extension": "py", "fi...
2.453125
stackv2
import copy import json import requests from flask import request, Response from tranql.backplane.api.standard_api import StandardAPIResource from tranql.config import config ####################################################### ## # Roger - query Roger-KP. ## ####################################################### ...
143
32.88
138
18
835
python
[{"finding_id": "codeql_py/request-without-cert-validation_e215129601e79006_4a431c2f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 60, 133 ]
[ null, null ]
[ 20, 20 ]
[ 51, 80 ]
2024-11-19T03:22:34.116745+00:00
1,631,633,657,000
b44bdfdb343898fe45a1fb6102277e47dc673a03
3
{ "blob_id": "b44bdfdb343898fe45a1fb6102277e47dc673a03", "branch_name": "refs/heads/master", "committer_date": 1631633657000, "content_id": "7ffc9b453ae1107fac014179ac7bb62b75b3b45a", "detected_licenses": [ "MIT" ], "directory_id": "67b9916f36a5355c9c1001b5446e6d4b3e5d9815", "extension": "py", "fi...
3.140625
stackv2
# Importing Libraries from typing import final from confluent_kafka import Consumer from time import sleep from pymongo import MongoClient # Created KafkaConsoleConsumer, which reads data of Kafka Console from Source and passing # Mongo DB of Atlas Cloud for Dashboard data presentation for users. class KafkaConsole...
104
42.02
118
21
787
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f87c341df34da6b9_d299e0b7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 89 ]
[ null ]
[ 65 ]
[ 86 ]
2024-11-19T03:22:56.443736+00:00
1,598,834,769,000
243e962f3d832a7ede0598222fe9a9bbf410286d
4
{ "blob_id": "243e962f3d832a7ede0598222fe9a9bbf410286d", "branch_name": "refs/heads/master", "committer_date": 1598834769000, "content_id": "895753775c2725b310a4244d9b47f8f989d76779", "detected_licenses": [ "MIT" ], "directory_id": "4196053534d85b8a5bc2708c79be55a1efc227b0", "extension": "py", "fi...
3.96875
stackv2
class BakedGood: name: str fattening: int def __init__(self, name: str, fattening: int): self.name = name self.fattening = fattening class Consumer: weight: int def __init__(self): self.weight = 160 def eat(self, food: BakedGood): self.weight = self.weight + ...
75
23.95
67
13
529
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eea4970f032f772a_09b66d00", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 34 ]
[ null ]
[ 15 ]
[ 66 ]
2024-11-19T03:22:56.633384+00:00
1,601,877,471,000
abdd2eba5e7bbf763e0426e9bd4d0e1a2d147e91
2
{ "blob_id": "abdd2eba5e7bbf763e0426e9bd4d0e1a2d147e91", "branch_name": "refs/heads/master", "committer_date": 1601877471000, "content_id": "c83064daaca53ea56627e816aeb4870d88c4b895", "detected_licenses": [ "MIT" ], "directory_id": "3dbc2fb9265e10ffd2bb720b27838347c530dca1", "extension": "py", "fi...
2.421875
stackv2
from __future__ import absolute_import from __future__ import division from __future__ import print_function import os.path import tensorflow as tf from tensorflow.io import gfile from sklearn.model_selection import train_test_split import tarfile import zipfile from constants import * import wav2MFCC def extract_d...
99
28.71
120
16
693
python
[{"finding_id": "codeql_py/tarslip_d16660e61940440d_18e24912", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 21, 23 ]
[ null, null ]
[ 9, 9 ]
[ 35, 36 ]
2024-11-19T01:34:49.554596+00:00
1,543,595,682,000
33a99dd3537c31492b04b3169762a752e1b96cff
2
{ "blob_id": "33a99dd3537c31492b04b3169762a752e1b96cff", "branch_name": "refs/heads/master", "committer_date": 1543595682000, "content_id": "de14c101dd5589a77c7b23b66ac94f7e267cf46b", "detected_licenses": [ "MIT" ], "directory_id": "bbda44af7541784630752edf8060e48e39c9cb67", "extension": "py", "fi...
2.3125
stackv2
import config import requests import uuid from flask import Flask, request import io import os import scipy.io.wavfile from google.cloud import speech from google.cloud.speech import enums from google.cloud.speech import types from detect_emotions import create_vokaturi from sumy_api import summarize # Instantiates...
90
30.23
113
22
655
python
[{"finding_id": "codeql_py/command-line-injection_4cdcbb8137c1257d_1111eb41", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 15 ]
[ 46 ]
2024-11-19T01:34:50.187125+00:00
1,628,762,221,000
9c5fdb562b1a029c2f278073ee32d5e35571dd8d
3
{ "blob_id": "9c5fdb562b1a029c2f278073ee32d5e35571dd8d", "branch_name": "refs/heads/master", "committer_date": 1628762221000, "content_id": "c8d9b59d6b5b986ebcd07c78da3b9bb4134e8a0c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f4a91b8376dca10b54f14421855e69322a55d6a4", "extension": "py"...
2.71875
stackv2
import os import shutil from flask import Flask, request, redirect, url_for, send_file, render_template from werkzeug.utils import secure_filename # name the upload/input folder UPLOAD_FOLDER = 'static/input/' ALLOWED_EXTENSIONS = set(['csv']) app = Flask(__name__) app.config['UPLOAD_FOLDER'] = UPLOAD_FOLDER # chec...
165
35.3
124
16
1,254
python
[{"finding_id": "codeql_py/command-line-injection_8792294eed54c102_922482f5", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
15
true
[ "CWE-078", "CWE-078", "CWE-078", "CWE-078", "CWE-078", "CWE-078", "CWE-078", "CWE-601", "CWE-601", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/url-redirection", "py/url-redirection", "py/path-injection", "py/path-injection", "py/p...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This ...
[ 89, 93, 94, 97, 98, 99, 100, 28, 34, 58, 61, 61, 67, 71, 75 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 15, 15, 15, 15, 15, 15, 15, 29, 29, 17, 17, 33, 17, 17, 17 ]
[ 105, 99, 101, 124, 98, 101, 97, 40, 40, 32, 31, 48, 33, 32, 32 ]
2024-11-19T01:34:54.390598+00:00
1,551,868,366,000
dfd528cf188d61a3d8ba3dcaf2c11909d9d73b58
3
{ "blob_id": "dfd528cf188d61a3d8ba3dcaf2c11909d9d73b58", "branch_name": "refs/heads/master", "committer_date": 1551868366000, "content_id": "70780157aaa48e88ee287de1ce71f5531d62cff6", "detected_licenses": [ "MIT" ], "directory_id": "e6d1cf43165fcf85c7270b20f7b4b9e1571ce8bb", "extension": "py", "fi...
2.578125
stackv2
import os from flask import send_from_directory from ftd_main import create_app from flask_login import current_user, login_user, logout_user, login_required from ftd_main.models import db, FixedDeposit, User from ftd_main.forms import AddFixedDepositForm, Loginform, RegistrationForm, create_deposit from flask import f...
90
31.79
91
16
620
python
[{"finding_id": "codeql_py/url-redirection_6f824606dcf0f251_2b55bc31", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 55 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-19T01:34:58.665629+00:00
1,686,533,678,000
f3636dccd07d550756067f8f9eda5b421689f194
2
{ "blob_id": "f3636dccd07d550756067f8f9eda5b421689f194", "branch_name": "refs/heads/master", "committer_date": 1686533678000, "content_id": "d2bfa11cd999ad8b63e88a14a7e2dc5b21480782", "detected_licenses": [ "MIT" ], "directory_id": "cb30b5d6d8847f3cdded1171c4ad76bd1ea2b447", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # @Time : 2023/6/7 00:35 # @Author : tomoncle # @Site : https://github.com/tomoncle # @File : ssh.py # @Software: PyCharm import hashlib import json import random import time from threading import Thread import paramiko from channels.generic.websocket import Web...
193
32.37
107
17
1,754
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8d30a1cbf39006ef_9bfb7b9e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 53 ]
[ null ]
[ 9 ]
[ 73 ]
2024-11-19T02:17:21.200527+00:00
1,443,204,968,000
52bc8618025b4048a27eff26200ff5bc842f7f07
3
{ "blob_id": "52bc8618025b4048a27eff26200ff5bc842f7f07", "branch_name": "refs/heads/master", "committer_date": 1443204968000, "content_id": "e09cf5801c5981cddaaff979af7390736fbf9ce6", "detected_licenses": [ "MIT" ], "directory_id": "019e125f8b893512e252aaf27ff6b957c2cc302d", "extension": "py", "fi...
2.640625
stackv2
''' Created on 3 Mar 2015 @author: peterb ''' import tornado.web from PIL import Image import logging import io import os from blueshed.utils.bucket import Bucket class S3UploadHandler(tornado.web.RequestHandler): """ Simple upload hanlder to save images to s3. """ TYPE_MAP = { ".jpg"...
65
33.12
137
22
448
python
[{"finding_id": "codeql_py/stack-trace-exposure_916c2a3741b1ef9c_1976eb58", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-117", "CWE-117" ]
[ "py/stack-trace-exposure", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 63, 43, 62 ]
[ null, null, null ]
[ 24, 62, 31 ]
[ 41, 66, 35 ]
2024-11-19T02:17:42.479049+00:00
1,603,021,697,000
fe98d4f26da3cb37d1bba53be0598bd7554b9f4e
3
{ "blob_id": "fe98d4f26da3cb37d1bba53be0598bd7554b9f4e", "branch_name": "refs/heads/main", "committer_date": 1603021697000, "content_id": "0d1a494527f4affe0ac6f543481b528e05dd9c0a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7ce19387d1dce9ab9cf8f6c190e25a8f4c876973", "extension": "py", ...
2.53125
stackv2
from rest_framework.response import Response from rest_framework.decorators import api_view from rest_framework import status from datetime import datetime from . import models @api_view(['POST']) def create_order(request): """ { "user_id": "1", "product_details": [ { "product_id": "2", "quantity": ...
49
25.55
109
14
341
python
[{"finding_id": "codeql_py/stack-trace-exposure_66917e8b3b88e9f2_6267cdf4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 48 ]
[ null ]
[ 25 ]
[ 73 ]
2024-11-19T02:17:47.105227+00:00
1,600,197,526,000
89b4e28aa044882862e6dffb8c8ad19be0e2b281
3
{ "blob_id": "89b4e28aa044882862e6dffb8c8ad19be0e2b281", "branch_name": "refs/heads/master", "committer_date": 1600197526000, "content_id": "faa522fe1f649c2d50268e90a0f3b41a85907488", "detected_licenses": [ "MIT" ], "directory_id": "fdb314a20cbffc4987b9861828335efe34b21516", "extension": "py", "fi...
2.578125
stackv2
from discord import Member, Embed, Status, Color from discord.ext import commands from os import environ from asyncio import sleep from sqlite3 import connect from datetime import datetime from re import findall from github import Github class Moderation(commands.Cog, name='Moderation'): """ Can only be used ...
132
51.7
170
20
1,741
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_954ff4230d9ed6dc_e9452b75", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL.", "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 109, 108 ]
[ null, null ]
[ 20, 54 ]
[ 39, 57 ]
2024-11-19T02:18:20.793550+00:00
1,681,751,123,000
8f243062f4491449c84481a393f805e2e7097984
2
{ "blob_id": "8f243062f4491449c84481a393f805e2e7097984", "branch_name": "refs/heads/main", "committer_date": 1681751123000, "content_id": "0c12f6a6224542373ac535cd1d4d3aa340800572", "detected_licenses": [ "MIT" ], "directory_id": "48d8292fa3fe2bdaf3e36beb3f19733d7dcb3508", "extension": "py", "file...
2.5
stackv2
from pathlib import Path import click from click.testing import CliRunner from jinja2 import Environment, FileSystemLoader import yaml from deon.cli import main as deon_command from deon.formats import Markdown, EXTENSIONS from deon.parser import Checklist env = Environment( loader=FileSystemLoader("md_template...
107
28.64
117
17
727
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8bd6ffea7294eb5d_2d091ab2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ 15 ]
[ 7 ]
[ 2 ]
2024-11-19T02:18:21.251380+00:00
1,598,205,414,000
45d2cf3da5f76d1415309dc117e133280b88665a
3
{ "blob_id": "45d2cf3da5f76d1415309dc117e133280b88665a", "branch_name": "refs/heads/master", "committer_date": 1598205414000, "content_id": "0477980c41229a50231bd27ab380514dd868dc87", "detected_licenses": [ "MIT" ], "directory_id": "8e94945c46c9e3abb32b31da1bec662b10769f88", "extension": "py", "fi...
2.546875
stackv2
import socket import ssl import re def conferma(user,passwd): #indirizzo e porta mail server pop3 mailserver = ("pop.gmail.com", 995) # comandi del protocollo pop3 da inviare al server comandi = [f'{user} \r\n',f'{passwd} \r\n'] # connesione al socket tramite tunneling ssl siccome gmail ...
69
38.57
144
15
771
python
[{"finding_id": "codeql_py/overly-large-range_3472afa00c3347a1_9b73c8cc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[&'()*+,\\-.\\/\\].", "remediation": "", "location": ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[&'()*+,\\-.\\/\\].", "Suspicious character range that is equivalent to \\[&'()*+,\\-.\\/\\]." ]
[ 39, 39 ]
[ null, null ]
[ 47, 79 ]
[ 50, 82 ]
2024-11-19T02:18:41.561865+00:00
1,477,051,344,000
ceedd4ec9b7fadc1d1fcfaf6b371f6ae2375441d
3
{ "blob_id": "ceedd4ec9b7fadc1d1fcfaf6b371f6ae2375441d", "branch_name": "refs/heads/master", "committer_date": 1477051344000, "content_id": "daac75f69a4a900645f6b85566048de64ceae23e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "979cf95a541c32014bcc592d21bb7735041bada6", "extension": "p...
2.703125
stackv2
"""arsenal.user - user blueprint""" from flask import ( Blueprint, flash, redirect, request, render_template, url_for, ) from flask_login import ( LoginManager, current_user, login_required, login_user, logout_user, ) from .forms import ( ChangeEmailForm, ChangeNameF...
130
26.68
79
16
750
python
[{"finding_id": "codeql_py/url-redirection_5db60283a60932e5_55d20e82", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
4
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 70, 85, 100, 113 ]
[ null, null, null, null ]
[ 29, 29, 29, 29 ]
[ 78, 78, 78, 78 ]
2024-11-19T02:29:51.506595+00:00
1,520,583,750,000
9fab5987ff438da60bb411af7cef7937dd920177
3
{ "blob_id": "9fab5987ff438da60bb411af7cef7937dd920177", "branch_name": "refs/heads/master", "committer_date": 1520587886000, "content_id": "ff0de6c38c39b550410cf95397e2554bd2a7c447", "detected_licenses": [ "Apache-2.0" ], "directory_id": "16a223d5cb6a96e1b6a9aa84636670fa7ddf7fda", "extension": "py"...
2.78125
stackv2
# -*- coding: utf-8 -*- """ Pull forecast and historical weather and do power usage prediction by weather """ import requests import json import random import copy from datetime import datetime from datetime import timedelta from config import FORECAST_URL, HISTORICAL_URL, FORECAST_RANGE, PROXY from admin import db fr...
182
31.37
122
15
1,539
python
[{"finding_id": "codeql_py/request-without-cert-validation_e8734e6cdef5bd50_a9cedfd4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 11 ]
[ 72 ]
2024-11-19T02:30:19.587925+00:00
1,572,345,370,000
31f5cb3fc2fbaed4ac3118bd8d5c29906b4a0aa8
2
{ "blob_id": "31f5cb3fc2fbaed4ac3118bd8d5c29906b4a0aa8", "branch_name": "refs/heads/master", "committer_date": 1572345370000, "content_id": "c8b404f35614a95ff95d0b9c350b84c6bc6d6a67", "detected_licenses": [ "MIT" ], "directory_id": "cbcbd3d3b19268b53c2b2456ed48c357bc101297", "extension": "py", "fi...
2.484375
stackv2
import sqlite3 import base64 import binascii import itsdangerous from flask import request, current_app from flask_login import UserMixin from hashlib import sha256 from eve.auth import TokenAuth from config import reporting_app_config as cfg from egcg_core.rest_communication import Communicator user_db = sqlite3.conn...
147
30.86
100
16
1,049
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4738b88c0768f8ca_656f177a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 68 ]
[ null ]
[ 19 ]
[ 32 ]
2024-11-19T02:30:22.692329+00:00
1,599,605,631,000
2775eca99c13ea8a94d32b67b8c6b55d1d98df2e
4
{ "blob_id": "2775eca99c13ea8a94d32b67b8c6b55d1d98df2e", "branch_name": "refs/heads/master", "committer_date": 1599605631000, "content_id": "fcfd7aa66aeacf4ddfdbf4687b9f31e7872a3a1c", "detected_licenses": [ "MIT" ], "directory_id": "a0e91e6722d417bc7f880095a99e27df1632905b", "extension": "py", "fi...
3.8125
stackv2
#!/usr/bin/env python3 ''' Simple example of Reflective Cross-Site Scripting (XSS). The web page asks the user's name and responds with a greeting. The input is not-sanitized and the output is not escaped. The following can be entered into the name field to demonstrate the xss vulnerability: <scr...
39
28.64
67
12
266
python
[{"finding_id": "codeql_py/reflective-xss_23ded46a96e972d1_8f0915f4", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 39 ]
[ null ]
[ 12 ]
[ 20 ]
2024-11-19T02:30:23.110336+00:00
1,296,497,497,000
a5ccc3889d5bd30d7b675858cf89e2a7779ec752
3
{ "blob_id": "a5ccc3889d5bd30d7b675858cf89e2a7779ec752", "branch_name": "refs/heads/master", "committer_date": 1296497497000, "content_id": "bbd7b8339c272da583bf71c989ccfb14d75db553", "detected_licenses": [ "MIT" ], "directory_id": "04294aa45cc6fed7038f9647d723a5b2ab69af7f", "extension": "py", "fi...
2.734375
stackv2
#!/usr/bin/env python ## @file # # cURL wrapper for FTP operations. # # @see http://pycurl.sourceforge.net/ # package imports import os import pycurl ################################################################################ # Global Constants ##################################################################...
281
28.23
91
15
1,752
python
[{"finding_id": "codeql_py/request-without-cert-validation_32a3bd22d5a196f3_9734fbe9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 145 ]
[ null ]
[ 13 ]
[ 60 ]
2024-11-19T02:30:31.675672+00:00
1,692,804,620,000
4be0c527ef64105588cf11b9679cbd2a0d8928d3
2
{ "blob_id": "4be0c527ef64105588cf11b9679cbd2a0d8928d3", "branch_name": "refs/heads/main", "committer_date": 1692804620000, "content_id": "e61eb3ff8592dc4a002f8c79219defcca95a1863", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "29bd0e9b5bdef7e2b4ff79edda3be258d5bde63c", "extension": "py"...
2.5
stackv2
"""A sphinx extension to process jinja/rst template Usage: define the context variable needed by the document inside ``jinja_contexts`` variable in ``conf.py`` """ # https://www.ericholscher.com/blog/2016/jul/25/integrating-jinja-rst-sphinx/ from pathlib import Path import jinja2 from . import rst_helpers,...
55
26.6
86
14
363
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e278dc923a083662_259ece71", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32 ]
[ 35 ]
[ 23 ]
[ 10 ]
2024-11-19T02:41:55.179487+00:00
1,621,816,236,000
559662191c3c0d93d8625c64d13b03fe4164f341
3
{ "blob_id": "559662191c3c0d93d8625c64d13b03fe4164f341", "branch_name": "refs/heads/master", "committer_date": 1621816236000, "content_id": "25dc7ada84fd0482b4c8286d69eba57db6d94666", "detected_licenses": [ "MIT" ], "directory_id": "692f33d30d088b7bb366e935437a0ba44a319433", "extension": "py", "fi...
3.0625
stackv2
import json import os import random import requests from tqdm import tqdm def make_url(fov, heading, key, location, pitch, size, source): return "https://maps.googleapis.com/maps/api/streetview"\ +"?size="+size\ +"&fov="+str(fov)\ +"&heading="+str(heading)\ +"&key="+key\ ...
81
31.58
95
20
800
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e2dca736989e6a73_dc06b861", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text.\nThis expression stores [sensitive data ...
[ 35 ]
[ null ]
[ 22 ]
[ 35 ]
2024-11-19T02:42:06.069472+00:00
1,633,116,959,000
89cc98255d69294594a4a527fb591f872383473e
3
{ "blob_id": "89cc98255d69294594a4a527fb591f872383473e", "branch_name": "refs/heads/master", "committer_date": 1633116959000, "content_id": "8ac864326ca850737229d8b4efa3b95f732578c2", "detected_licenses": [ "MIT" ], "directory_id": "3898b2a8499ad73bc7564c07e5d8c216c38c31ef", "extension": "py", "fi...
3.21875
stackv2
# ----------------------------------------- # DOWNLOAD AND ORGANIZE FLOWERS17 DATASET # ----------------------------------------- import os import glob import tarfile import urllib.request def download_dataset(filename, url, work_dir): """ Purpose: This function will download the data from the specified location. ...
121
30.49
104
14
980
python
[{"finding_id": "codeql_py/tarslip_cb1373a4a88d8a60_b8f3a740", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 48 ]
[ null ]
[ 36 ]
[ 50 ]
2024-11-19T02:50:46.713599+00:00
1,425,629,248,000
ac6ba97233e5475d34f346e099e4865660b4ca66
3
{ "blob_id": "ac6ba97233e5475d34f346e099e4865660b4ca66", "branch_name": "refs/heads/master", "committer_date": 1425629248000, "content_id": "5468db0e832ad0c2a09e22aa220fc7ae581d0b27", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b76095275dd7679e610dcad0c6d21af213c34c0c", "extension": "py"...
3.109375
stackv2
""" Contains functions and utilities which are used by multiple modules. """ from datetime import datetime as dt import jinja2 import os import pytz def get_parent_dir(): """ :return: Absolute path of the parent of the directory of this file. """ cwd = os.path.dirname(__file__) # Here __file__ r...
62
35.31
162
10
498
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_78743324f0132c04_e4918954", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 46 ]
[ null ]
[ 19 ]
[ 115 ]
2024-11-19T02:50:54.293116+00:00
1,592,886,025,000
b182922fd46c598a065d65fba130a4311d2fb704
3
{ "blob_id": "b182922fd46c598a065d65fba130a4311d2fb704", "branch_name": "refs/heads/master", "committer_date": 1592886025000, "content_id": "d2fa26771384996cb74067a7c1d1632cd37c616f", "detected_licenses": [ "MIT" ], "directory_id": "f7ccb9215b55bb6e954d7e470f59a1eaf2b411f5", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python3 from flask import Flask, request from .session import BashSession app = Flask(__name__) def session_route(command=None): if command: return "/session/id/<session>/" + command else: return "/session/id/<session>" sessions = {} def get_session(session, type=None): ...
73
19.93
53
13
357
python
[{"finding_id": "codeql_py/reflective-xss_54a65b6071b81121_71902a66", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 36, 46, 56, 66 ]
[ null, null, null, null ]
[ 16, 16, 16, 16 ]
[ 54, 54, 54, 54 ]
2024-11-18T18:05:54.195133+00:00
1,605,931,535,000
613a321136f9bae0387971468f54fb80380c807c
2
{ "blob_id": "613a321136f9bae0387971468f54fb80380c807c", "branch_name": "refs/heads/master", "committer_date": 1605931535000, "content_id": "05c2a80ca060e1caf507ccf6d5f7f76e1e7c9ec2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "07cdff3dfac2b8f5eccfb945d72837efe1ea2fe9", "extension": "py"...
2.5
stackv2
from argparse import ArgumentParser from uuid import uuid4 from datetime import datetime from flask import Flask from flask import request from Crypto.Hash import SHA256 from blockchain.blockchain_data_structure import BlockchainInstance from crypto.keygen import generate_key_pair import json import jsonpickle import o...
142
30.9
117
15
1,032
python
[{"finding_id": "codeql_py/stack-trace-exposure_49de7dae20770504_b8b83253", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 65 ]
[ null ]
[ 16 ]
[ 27 ]
2024-11-18T18:05:54.457188+00:00
1,600,171,858,000
496f89de26d62d06873d30f0cf8783b66673abc9
3
{ "blob_id": "496f89de26d62d06873d30f0cf8783b66673abc9", "branch_name": "refs/heads/master", "committer_date": 1600171858000, "content_id": "791cbe5d4779b967051ddc6e28d12fd5b01075d3", "detected_licenses": [ "MIT" ], "directory_id": "1d168a01a627695044d0a89cc08430a7f77a2f4d", "extension": "py", "fi...
3.359375
stackv2
# a simple python AES decrypter. Do not remember why I needed this, but nice to have. :) pw = [255,155,28,115,214,107,206,49,172,65,62,174,19,27,70,79,88,47,108,226,209,225,243,218,126,141,55,107,38,57,78,91] pw1 = b'' for i in pw: pw1 += i.to_bytes(1, 'little') import sys, hexdump, binascii from Crypto.Cipher im...
27
27.89
119
11
345
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_90a152dfde383d3a_6e37b8bf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 27 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-18T18:06:00.595412+00:00
1,641,871,211,000
ce98a7c092efff2a994876e85db49eeb32598318
2
{ "blob_id": "ce98a7c092efff2a994876e85db49eeb32598318", "branch_name": "refs/heads/master", "committer_date": 1641871211000, "content_id": "e76d0ca027c860feb11d880ff49f04d2efcab9b4", "detected_licenses": [ "MIT" ], "directory_id": "8a65bb494b7f1ee8684f8e8ed391668b4ebd0e13", "extension": "py", "fi...
2.46875
stackv2
import time from random import randint class bcolors: HEADER = '\033[95m' OKBLUE = '\033[94m' OKGREEN = '\033[92m' WARNING = '\033[93m' FAIL = '\033[91m' ENDC = '\033[0m' BOLD = '\033[1m' UNDERLINE = '\033[4m' passwords = ['Dylan_2791', '123456seven', 'No match found'] keywords = ['Dylan; June 3rd, Stonehendg...
34
37.85
84
13
535
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6115c0c95ce428de_6470e07e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 34 ]
[ null ]
[ 8 ]
[ 37 ]
2024-11-18T18:16:05.739264+00:00
1,568,561,726,000
ca8d8ce15b0c0f81a4a81c3a9089d5b6d2aebd08
2
{ "blob_id": "ca8d8ce15b0c0f81a4a81c3a9089d5b6d2aebd08", "branch_name": "refs/heads/master", "committer_date": 1568561726000, "content_id": "89465fc27fef7f4d305fff82fc9343a63ddc3d71", "detected_licenses": [ "MIT" ], "directory_id": "0ff7b19bfb3f6d172fec98040e58da86dc9baa66", "extension": "py", "fi...
2.3125
stackv2
from flask import Blueprint, render_template, flash, redirect, url_for, request, jsonify, send_from_directory from flask_login import login_user, current_user, logout_user, login_required from flaskapp import db, bcrypt, login_manager from flaskapp.main.forms import RegistrationForm, LoginForm, PostForm from flaskapp.m...
127
38.02
160
25
1,147
python
[{"finding_id": "codeql_py/url-redirection_4aeb035019d2f7d1_8c291948", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 44 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-18T19:31:06.544526+00:00
1,628,492,827,000
80bad4bf50e5fca5e3b686f66a10e1ae10c0281e
3
{ "blob_id": "80bad4bf50e5fca5e3b686f66a10e1ae10c0281e", "branch_name": "refs/heads/master", "committer_date": 1628492827000, "content_id": "0fdb97829117dce246da0eb2c2a7549feb814813", "detected_licenses": [ "MIT" ], "directory_id": "762c66d73e62cbd1f24f2efdd5fa89372e08f5ce", "extension": "py", "fi...
2.796875
stackv2
import os import csv import talib import pandas import array as arr import yfinance as yf import json from flask import Flask, request, render_template from patterns import candlestick_patterns from datetime import date app = Flask(__name__) @app.route('/getjson') def getjson(): ticker = request.args.get('symbol...
179
27.2
82
19
1,129
python
[{"finding_id": "codeql_py/path-injection_32e477613fd81be1_6ebbf379", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 168 ]
[ null ]
[ 15 ]
[ 26 ]
2024-11-18T18:59:39.092342+00:00
1,636,057,218,000
eb52b25d07c826e98ef90f2d0e8ecd5ac617be82
2
{ "blob_id": "eb52b25d07c826e98ef90f2d0e8ecd5ac617be82", "branch_name": "refs/heads/master", "committer_date": 1636057218000, "content_id": "b0610e46b763f359a0f2a71e458b8aa58b60fa16", "detected_licenses": [ "Apache-2.0" ], "directory_id": "86386b8fafe1a3922390cb865fd6c3fe1db2efed", "extension": "py"...
2.484375
stackv2
# IMPORTS import logging from functools import wraps from werkzeug.security import check_password_hash from flask import Blueprint, render_template, flash, redirect, url_for, request, session from flask_login import current_user, login_user, logout_user from datetime import datetime from app import db from lottery.view...
152
39.89
119
18
1,245
python
[{"finding_id": "codeql_py/log-injection_9b39590b1c19311f_0f9e38f3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
7
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depen...
[ 49, 82, 86, 90, 94, 112, 130 ]
[ null, null, null, null, null, null, null ]
[ 83, 100, 100, 100, 98, 99, 92 ]
[ 102, 119, 119, 119, 117, 118, 111 ]
2024-11-18T19:11:46.957096+00:00
1,611,790,997,000
bbf0de7368466dedac2f8a72cc8c5e12f852342c
3
{ "blob_id": "bbf0de7368466dedac2f8a72cc8c5e12f852342c", "branch_name": "refs/heads/main", "committer_date": 1611790997000, "content_id": "1ae56576584b3bf5562b6f6d2884b43f6955ebe9", "detected_licenses": [ "MIT-0" ], "directory_id": "7316e3d6b196722d73799b2aabfc7515fc159e9a", "extension": "py", "fi...
2.859375
stackv2
from datetime import datetime, timezone import pytz from data_access.data_config import PROFILE_TABLE from data_access.ddb_util import query_item_ddb, get_item_ddb import logging from data_access.data_config import LOG_LEVEL from boto3.dynamodb.conditions import Key logger = logging.getLogger('UserProfile') logger....
98
34.7
107
17
749
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1114567caadd35df_6af7064e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 90 ]
[ null ]
[ 21 ]
[ 65 ]
2024-11-18T19:23:59.343113+00:00
1,671,563,629,000
4238a220912ae184be322a28df674c08c20e3f86
2
{ "blob_id": "4238a220912ae184be322a28df674c08c20e3f86", "branch_name": "refs/heads/master", "committer_date": 1674514449000, "content_id": "a3702726909dc5d2b25d95c096f2e7a69651f204", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "810f2f57c70e9df1e1c3862a2f43965ca9d88610", "extension": "p...
2.5
stackv2
#!/usr/bin/env python3 import urllib import time import logging from http.server import HTTPServer, BaseHTTPRequestHandler, SimpleHTTPRequestHandler from socketserver import ThreadingMixIn import threading import json import subprocess import sys USE_HTTPS = False pathWhiteList = {"/", "/athanor.js", "/athanor...
96
32.74
116
15
784
python
[{"finding_id": "codeql_py/insecure-default-protocol_f149696492fc8a24_e70ad3b0", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 89 ]
[ null ]
[ 25 ]
[ 117 ]
2024-11-18T19:58:20.614207+00:00
1,582,579,915,000
aef5ee43f56b56e57c64031d07dfbf24412c259b
3
{ "blob_id": "aef5ee43f56b56e57c64031d07dfbf24412c259b", "branch_name": "refs/heads/master", "committer_date": 1582579915000, "content_id": "a7ed2b84844b371d38df133940e2e0630a397990", "detected_licenses": [ "MIT" ], "directory_id": "abd30d389b1ff2be523300fb41cb919229ef305d", "extension": "py", "fi...
3.15625
stackv2
#! python3 #! Version 0.2 by gbn1 #! https://github.com/gbrn1/cEX from modules import cex128 from modules import banners import os import time import getpass import hashlib import platform class MAIN: def __init__(self): self.config_file = "config.dat" os.chdir("data") def clear(self): ...
108
32.11
120
21
837
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_62ff68df62807aa8_783c05e0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 26 ]
[ null ]
[ 33 ]
[ 71 ]
2024-11-18T19:58:20.716362+00:00
1,627,282,167,000
2d686196a8281b22e370912c072344164cf3b5aa
2
{ "blob_id": "2d686196a8281b22e370912c072344164cf3b5aa", "branch_name": "refs/heads/master", "committer_date": 1627282167000, "content_id": "adf689894aef20b3a325413438d46fafd1574921", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c385ad363b20c47e160080ea12b666e0730d7cf8", "extension": "py"...
2.3125
stackv2
from flask import Blueprint, redirect, url_for, flash, render_template, request from flask_login import current_user, login_user, logout_user, login_required from flaskblog import bcrypt, db from flaskblog.models import User, Post from flaskblog.users.forms import RegistrationForm, LoginForm, \ UpdateAccountForm ...
98
38.08
79
16
721
python
[{"finding_id": "codeql_py/url-redirection_5f60526706e0ba5a_baff5bc6", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 43 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-18T19:58:35.325385+00:00
1,689,457,617,000
fe9e508f426e684a50c6c25cca91d92d90c03997
3
{ "blob_id": "fe9e508f426e684a50c6c25cca91d92d90c03997", "branch_name": "refs/heads/main", "committer_date": 1689457617000, "content_id": "bbba7109daf930964fc95af23076e12e795ed637", "detected_licenses": [ "CC0-1.0" ], "directory_id": "f3bf3cb6ddbbfbb5e47a3e533bd5b28371c7c1ca", "extension": "py", "...
2.984375
stackv2
# Get the PIDs of datasets in a given dataverse (and optionally any dataverses in that dataverse). # Includes deaccessioned datasets. Excludes harvested and linked datasets. import csv import glob import json import os import requests import sys import time from tkinter import filedialog from tkinter import ttk from t...
360
40.32
177
21
3,561
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b438c4d3f351fa6_0a5c8bbe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive dat...
[ 244, 171, 213 ]
[ null, null, null ]
[ 31, 15, 27 ]
[ 58, 158, 54 ]
2024-11-18T19:58:36.410409+00:00
1,579,421,452,000
cf050a3695ad195122908fa0b1a354332ab5d413
3
{ "blob_id": "cf050a3695ad195122908fa0b1a354332ab5d413", "branch_name": "refs/heads/master", "committer_date": 1579421452000, "content_id": "3a391c2a8a05818c84e8984e7513c64a17ba63ba", "detected_licenses": [ "MIT" ], "directory_id": "b73389ba7c9948177a522154a297a63875da2a8a", "extension": "py", "fi...
2.84375
stackv2
import json import plotly import numpy as np import pandas as pd import re import nltk from nltk.stem import WordNetLemmatizer from nltk.tokenize import word_tokenize from nltk.corpus import stopwords from flask import Flask from flask import render_template, request, jsonify from plotly.graph_objs import Bar from skle...
236
27.34
124
17
1,492
python
[{"finding_id": "codeql_py/overly-large-range_2b9aa2ab9179871c_de4c257a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
2
true
[ "CWE-020", "CWE-215" ]
[ "py/overly-large-range", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 47, 232 ]
[ null, null ]
[ 48, 5 ]
[ 51, 51 ]
2024-11-18T18:39:57.300675+00:00
1,544,521,867,000
a1e9313592d0377acc761b85356afc981520dfbd
2
{ "blob_id": "a1e9313592d0377acc761b85356afc981520dfbd", "branch_name": "refs/heads/master", "committer_date": 1544521867000, "content_id": "6ed258b7369df83e02011f054b322b16080988ef", "detected_licenses": [ "MIT" ], "directory_id": "f0fa6cd0885d0615b5a676e132f36004182dacb7", "extension": "py", "fi...
2.3125
stackv2
import argparse import json import pickledb import requests import threading import time from flask import Flask, request, make_response app = Flask(__name__) apiKey = None easemlAddr = None db = pickledb.load("id_mappings.db", True) def run_get_query(url, params=None): params = params or {} result = [] ...
216
31.06
146
18
1,835
python
[{"finding_id": "codeql_py/flask-debug_bbcfcdca6f738af2_1f3eb939", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-918" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [use...
[ 216, 67, 147, 63 ]
[ null, null, null, null ]
[ 5, 30, 26, 9 ]
[ 24, 52, 42, 112 ]
2024-11-18T18:40:03.050328+00:00
1,593,941,059,000
9b1d2b1e0026df8ef8414c8a2e540fb11930a55e
2
{ "blob_id": "9b1d2b1e0026df8ef8414c8a2e540fb11930a55e", "branch_name": "refs/heads/master", "committer_date": 1593941059000, "content_id": "7b7459d4966d0bae2eba295f8e611de046977075", "detected_licenses": [ "Apache-2.0" ], "directory_id": "999053056d970c4cbcd1b7e508963a421238609c", "extension": "py"...
2.453125
stackv2
#! /usr/bin/python3 # -*- coding: utf-8 -*- import logging import json from flask import Flask, request, make_response, jsonify from analysis_service import Analyst from search_service import Search from render_service import Graph_Formatter from realtime_monitor_service import Realtime_Monitor app = Flask(__name__) ...
137
37.95
121
15
1,184
python
[{"finding_id": "codeql_py/flask-debug_ef07ba6bd3bdcfa2_3a4215e1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
7
true
[ "CWE-215", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry de...
[ 137, 33, 43, 45, 119, 122, 124 ]
[ null, null, null, null, null, null, null ]
[ 5, 17, 15, 15, 21, 13, 21 ]
[ 24, 67, 52, 92, 70, 75, 70 ]
2024-11-18T18:46:57.153355+00:00
1,636,184,056,000
a821612d4f506c3a510fe91c3258da87b28d5f2b
3
{ "blob_id": "a821612d4f506c3a510fe91c3258da87b28d5f2b", "branch_name": "refs/heads/master", "committer_date": 1636184056000, "content_id": "16cd4408dd7fc38707ea7be8fd600662de6b5eda", "detected_licenses": [ "MIT" ], "directory_id": "903ac284ebf68ba1b24999c56774faca3a3ac8ba", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python # -*- coding:utf-8 -*- import configparser import jieba import jieba.posseg import jieba.analyse import json import io import os import pymysql import re import sys import time import urllib.request import urllib.parse import wordcloud sys.stdout = io.TextIOWrapper(sys.stdout.buffer, encoding='...
77
29.84
131
14
642
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6629156c805bda9d_c6ff74d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 38 ]
[ null ]
[ 7 ]
[ 114 ]
2024-11-18T20:58:18.781346+00:00
1,603,736,696,000
dcb685603643fd6271936ba08b7e076b87ef39a0
3
{ "blob_id": "dcb685603643fd6271936ba08b7e076b87ef39a0", "branch_name": "refs/heads/master", "committer_date": 1603736696000, "content_id": "8bc214cf8ceccd258ec1f93ea4cac3a84e0c50a0", "detected_licenses": [ "MIT" ], "directory_id": "3facd37976ecda3500a9430baf2d2b7eb0c7d5fc", "extension": "py", "fi...
2.96875
stackv2
#!/usr/bin/env python3 from optparse import OptionParser import os from os import path import tarfile import shutil import zipfile temp_dir = '.tempdir' def check_temp_dir(): if not path.exists(temp_dir): os.mkdir(temp_dir) def replace_item(source, destination): print("Source {}, dest {}".format(sour...
142
31.57
97
15
1,002
python
[{"finding_id": "codeql_py/tarslip_21fbc2e6bcc31b7f_45993d46", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 42, 74 ]
[ null, null ]
[ 5, 5 ]
[ 12, 12 ]
2024-11-18T20:58:19.082426+00:00
1,617,338,445,000
2ac13f05c7749d575bc0451231ec5added394bce
3
{ "blob_id": "2ac13f05c7749d575bc0451231ec5added394bce", "branch_name": "refs/heads/master", "committer_date": 1617338445000, "content_id": "09d3acc0ad356ddfd2fc4eb3d2efa736559c7474", "detected_licenses": [ "MIT" ], "directory_id": "6aa5e41a374ac632e3ae447d690176147c2bdecf", "extension": "py", "fi...
2.9375
stackv2
import time import yaml import pickle import requests import webbrowser from urllib import parse from jinja2 import Template from geopy.geocoders import Nominatim class User: """ Class to store user config to get and update Strava activities. Attributes: access_token (str): Your Strava access tok...
268
37.48
78
18
1,986
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e8a250f538b7d6b8_f7d3c2c0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 194 ]
[ null ]
[ 16 ]
[ 30 ]
2024-11-18T19:49:11.498137+00:00
1,634,279,112,000
8a7db691a9146bd62b5e8845009b1f61e6e058f3
2
{ "blob_id": "8a7db691a9146bd62b5e8845009b1f61e6e058f3", "branch_name": "refs/heads/master", "committer_date": 1634279112000, "content_id": "94fb48d829ec90b0d54ffbd725d8717f603e3538", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4aac2786259842f1b452f86557e3841788d1dddd", "extension": "py"...
2.359375
stackv2
import requests import logging import sys import json import tempfile import os from obs import ObsClient logger = logging.getLogger('log') def get_token(appid, secret): url = 'https://api.weixin.qq.com/cgi-bin/token?appid={}&secret={}&grant_type=client_credential'.format(appid, ...
73
33.53
126
13
580
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f8bc647daf110ffa_1112f6d8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (sec...
[ 47, 23, 37 ]
[ null, null, null ]
[ 17, 22, 22 ]
[ 24, 30, 32 ]
2024-11-18T20:15:47.763610+00:00
1,522,070,424,000
1ce00ac55a20f1255d6055b85ebf5ff68f1fcb00
3
{ "blob_id": "1ce00ac55a20f1255d6055b85ebf5ff68f1fcb00", "branch_name": "refs/heads/master", "committer_date": 1522070424000, "content_id": "732b0adb526c96fc5060cbc7daefb160f5c61756", "detected_licenses": [ "MIT" ], "directory_id": "51941ce18b0df9a8e189553942a70056beb76f7b", "extension": "py", "fi...
2.984375
stackv2
import bcrypt import getpass import hashlib pwPath = os.path.expanduser('~' + '/.mpassword/') def storePassword(): password = getpass.getpass('Enter in the Master Key: ') check = getpass.getpass('Enter in Master Key again: ') while check != password: check = getpass.getpass('Incorrect entry. Plea...
37
36.7
100
14
325
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7988d0e85c7cbe43_2ee2df70", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 17 ]
[ null ]
[ 26 ]
[ 43 ]
2024-11-18T20:15:58.506598+00:00
1,572,042,096,000
b865bf613c0c65930978bb109b6bb18c660f9895
3
{ "blob_id": "b865bf613c0c65930978bb109b6bb18c660f9895", "branch_name": "refs/heads/master", "committer_date": 1572042096000, "content_id": "19aae27c747e3cca8a0f28f8138563442d92a17a", "detected_licenses": [ "MIT" ], "directory_id": "44e6cf45d35340c1cd220a2ad189d9ad48136afc", "extension": "py", "fi...
3.015625
stackv2
from utils import get_random_string def run_postgres_wizard(env_file): if env_file.is_file(): update_postgres_env_file(env_file) else: generate_default_postgres_env_file(env_file) def generate_default_postgres_env_file(env_file): env_file["POSTGRES_USER"] = "misago_%s" % get_random_strin...
38
30.63
94
13
289
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_268f9b995737f0ca_e3b259f4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 36 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-18T20:16:00.632448+00:00
1,527,826,106,000
f210188fbe65b6136a50508d26bdb3045a68c375
3
{ "blob_id": "f210188fbe65b6136a50508d26bdb3045a68c375", "branch_name": "refs/heads/master", "committer_date": 1527826106000, "content_id": "d3f2461c88d1205a3ff0b399fd8892491303370d", "detected_licenses": [ "MIT" ], "directory_id": "c32e8496712559fb0f2f5d299d400337d404c502", "extension": "py", "fi...
3
stackv2
import os import csv from us_state_abbrev import us_state_abbrev input_file1 = 'employee_data1.csv' input_file2 = 'employee_data2.csv' output_file1 = 'reformatted_employee_data1.csv' output_file2 = 'reformatted_employee_data2.csv' folder_name = os.path.join('C:', '\\Users', 'jmose', 'Downloads', 'UDEN201805DATA1-mast...
52
32.54
170
14
508
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5f2a7de5c817f89f_051c3316", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text.\nThis expression stores [sensitive data ...
[ 47 ]
[ null ]
[ 17 ]
[ 31 ]
2024-11-18T19:38:41.329114+00:00
1,483,476,202,000
da812e2fb1822dccfc5c0e2ba45e71b5152396c1
3
{ "blob_id": "da812e2fb1822dccfc5c0e2ba45e71b5152396c1", "branch_name": "refs/heads/master", "committer_date": 1483476202000, "content_id": "ae6f6a2fe8b210d848259d3967e4d4d6a3fb0533", "detected_licenses": [ "MIT" ], "directory_id": "5aea92578876e2aacdb6163f7a19d2d249d4cb6d", "extension": "py", "fi...
3.21875
stackv2
#!/usr/bin/env python """ This script will take a lat-long pair (e.g., "-80.123, 45.678") in the final column, and determine if any other lines are at that exactly named pair. If so, it scatters them around in a circle. So if other points are adjacent or identical but differently named (-80.123 vs. -80.1230), this won...
134
37.53
116
20
1,246
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1a12396ee62045f2_7e5cd930", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 104 ]
[ null ]
[ 27 ]
[ 103 ]
2024-11-18T20:10:42.900728+00:00
1,520,491,663,000
93aaf84093f90ccf693e01370b972eee0526d03d
3
{ "blob_id": "93aaf84093f90ccf693e01370b972eee0526d03d", "branch_name": "refs/heads/master", "committer_date": 1520491663000, "content_id": "c10bc9b09e267ede60ddb825016fa077eddb2bae", "detected_licenses": [ "Unlicense" ], "directory_id": "d3b5909c7f5baef4bae93bdb69531a95ba143bcc", "extension": "py",...
2.515625
stackv2
# -*- coding: utf-8 -*- import os, sys, subprocess, threading, time, random import socketserver, http.server from queue import Queue, Empty import urllib class FFMpeg: def __init__(self, addr): self.addr = addr self.fragSize = 8192 self.opts = None self.buffer = Queue() self...
111
31.05
144
17
802
python
[{"finding_id": "codeql_py/command-line-injection_73b1b9b0090a524f_df4baafc", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 22 ]
[ null ]
[ 40 ]
[ 49 ]
2024-11-18T20:11:06.618414+00:00
1,587,175,738,000
4c7edbdf818c6bebabb5a7e1a935aeb6ac290c7f
3
{ "blob_id": "4c7edbdf818c6bebabb5a7e1a935aeb6ac290c7f", "branch_name": "refs/heads/master", "committer_date": 1587175738000, "content_id": "02919a16f480b6381fd46e214855a74695dbe017", "detected_licenses": [ "MIT" ], "directory_id": "25f3fb0c3bb0e65f1ba1c7d1d77be6bcb1c103b1", "extension": "py", "fi...
2.5625
stackv2
import os from pathlib import Path dir = str(Path(__file__).parent.absolute()) def setup(): user = input("Twitch Username: ") passwd = input("Twitch Password: ") f = open(dir+'/secrets.py','w') f.write( "user = '" + user + "'\n" "passwd = '" + passwd + "'" ) f.close p...
24
18.67
43
13
122
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ece219f51dcbd296_babb6c84", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 12 ]
[ 13 ]
[ 9 ]
[ 36 ]
2024-11-18T20:11:07.432854+00:00
1,557,986,275,000
49a00294b8aa1bfa04ef0eb351e1a29b4f11f224
3
{ "blob_id": "49a00294b8aa1bfa04ef0eb351e1a29b4f11f224", "branch_name": "refs/heads/master", "committer_date": 1557986275000, "content_id": "6e763105543f69e54a84b40793cab6ed16cd9cbe", "detected_licenses": [ "MIT" ], "directory_id": "77ce009d8776454bdebb247e8f4e43cae572d228", "extension": "py", "fi...
3.140625
stackv2
class User: def __init__(self, username, password): self.username = username self.password = self._encrypt_password(password) self.is_logged = False def _encrypt_password(self, password): import hashlib password = str.encode(password + self.username) enc...
100
28.66
59
15
555
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_78ee7fc8471d852c_76f7a666", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 12 ]
[ null ]
[ 26 ]
[ 34 ]
2024-11-18T20:26:07.486129+00:00
1,526,524,409,000
1629159572327032c03692586b22442ecf48033f
2
{ "blob_id": "1629159572327032c03692586b22442ecf48033f", "branch_name": "refs/heads/master", "committer_date": 1526524409000, "content_id": "ba433b9b1f8845d0faf69b04137de04756e00a15", "detected_licenses": [ "MIT" ], "directory_id": "0d474186bc41b87469477b6079f97b48c6e2a1bf", "extension": "py", "fi...
2.34375
stackv2
# code utf-8 import json import os import sys import urllib.parse import urllib.request from PyQt5.QtCore import QObject from PyQt5.QtCore import pyqtSlot from PyQt5.QtCore import pyqtSignal from PyQt5.QtCore import QUrl from PyQt5.QtWebChannel import QWebChannel from PyQt5.QtWebEngineWidgets import QWebEngineView fro...
83
32.36
109
11
715
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3c6a6d16dd21e494_bb46932d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 56 ]
[ null ]
[ 46 ]
[ 54 ]
2024-11-18T20:26:25.984701+00:00
1,617,074,727,000
9b5958d5dc9576ee23d137ab75e3fb9ee28dd02a
3
{ "blob_id": "9b5958d5dc9576ee23d137ab75e3fb9ee28dd02a", "branch_name": "refs/heads/main", "committer_date": 1617074727000, "content_id": "9ed2a6d6e6f7fecd28c8e25813b3d25478437298", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c11a08accbb84f1d66e1c8627e5b6a04c70b7e2c", "extension": "py"...
2.734375
stackv2
from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives.asymmetric import rsa from cryptography.hazmat.primitives import serialization from collections import namedtuple from cryptography.hazmat.primitives import hashes from cryptography.hazmat.primitives.asymmetric import padding ...
101
33.06
76
16
700
python
[{"finding_id": "codeql_py/overly-permissive-file_d10bb24bd8fdbf1b_e2816416", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world readable." ]
[ 92 ]
[ null ]
[ 15 ]
[ 51 ]
2024-11-18T20:26:36.813088+00:00
1,582,063,265,000
d84ae7db7e5048cdbc7f353d827c02ca77910b97
3
{ "blob_id": "d84ae7db7e5048cdbc7f353d827c02ca77910b97", "branch_name": "refs/heads/master", "committer_date": 1582063265000, "content_id": "9b4883b57554715152134599b9a2f7dda29d4f19", "detected_licenses": [ "MIT" ], "directory_id": "cac61da0e1a97204241f0df4acc2cab5a8b1825e", "extension": "py", "fi...
3.140625
stackv2
import time import folium from geopy.geocoders import Nominatim from geopy import distance def get_film_locations(input_year): """ Function reads data from location.list file :param input_year: string :return: set """ film_set = set() with open('data/locations.csv', 'r', encoding="utf-8", ...
124
35.97
94
22
1,146
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8dddea6e3af50572_aa811659", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 80, 81 ]
[ null, null ]
[ 11, 11 ]
[ 55, 57 ]
2024-11-18T20:26:37.708441+00:00
1,589,837,555,000
c7d672fa915709c821ecc756f54312c5a56b10c4
4
{ "blob_id": "c7d672fa915709c821ecc756f54312c5a56b10c4", "branch_name": "refs/heads/master", "committer_date": 1589837555000, "content_id": "8743d8f3052db5a84022d764ae809c7a1d057934", "detected_licenses": [ "MIT" ], "directory_id": "d519ddcb68c5caf7d0154464dba63973aa8e27a1", "extension": "py", "fi...
4.03125
stackv2
num_dict = {0:'', 1:'one', 2:'two', 3:'three', 4:'four', 5:'five', 6:'six', 7:'seven', 8:'eight', 9:'nine', 10:'ten', 11:'eleven', 12:'twelve', 13:'thirteen', 14:'fourteen', 15:'fifteen', 16:'sixteen', 17:'seventeen', 18:'eighteen', 19:'nineteen', 20:'twenty', 30:'thirty', 40:'forty', 50:'fifty', 60:'sixty', 70...
40
32.58
143
16
478
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_86da7dc0e5eac015_486cc616", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 34 ]
[ null ]
[ 11 ]
[ 25 ]
2024-11-18T20:26:40.051671+00:00
1,496,611,304,000
1292b2e54e975e99e6cb81eda31eefb26b0f901d
4
{ "blob_id": "1292b2e54e975e99e6cb81eda31eefb26b0f901d", "branch_name": "refs/heads/master", "committer_date": 1496611304000, "content_id": "c6f0073cacbc2bef66815763b7c01c6774cbf73b", "detected_licenses": [ "MIT" ], "directory_id": "9c2a9536363e139f44b38a911686eef307a9fb7c", "extension": "py", "fi...
3.578125
stackv2
# Crypto I. Week 3. Constructing Compression Functions. HW assignment from video at 5:00. # Tested in Python 3 # The collision finding solution: # E(k1, m1) ^ k1 = E(k2, m2) ^ k2 # E(k1, m1) ^ k1 ^ k2 = E(k2, m2) # D(k2, (E(k1, m1) ^ k1 ^ k2)) = D(k2, (E(k2, m2))) # D(k2, (E(k1, m1) ^ k1 ^ k2)) = m2 from Crypto.Ciphe...
52
24.12
89
9
462
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_8280e55a52ad9eea_acbec746", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 16, 22 ]
[ null, null ]
[ 10, 10 ]
[ 31, 31 ]
2024-11-18T20:26:54.032902+00:00
1,552,947,239,000
ca380f9f808a2e32670087577b09d429498c8fed
3
{ "blob_id": "ca380f9f808a2e32670087577b09d429498c8fed", "branch_name": "refs/heads/master", "committer_date": 1552947239000, "content_id": "bc92c768f854c1bcd3db18db45604fa1048d3a05", "detected_licenses": [ "MIT" ], "directory_id": "e3e9e0255673d46526424d07f96f51b4e1509358", "extension": "py", "fi...
2.953125
stackv2
"""Internal representation of a CAN trace. """ from jinja2 import Environment, PackageLoader, select_autoescape import datetime class InternalMessageDirection(object): RX = 1 TX = 2 class InternalMessageType(object): """ Attributes: DT: CAN or J1939 data frame FD: CAN FD data frame ...
224
24.42
77
17
1,314
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_00e5afe5a89e804d_c708d90e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 192, 213 ]
[ null, null ]
[ 15, 15 ]
[ 78, 78 ]
2024-11-18T20:52:06.500452+00:00
1,582,709,563,000
3c60953e6820508e16acce6fd052f56658bfcf95
3
{ "blob_id": "3c60953e6820508e16acce6fd052f56658bfcf95", "branch_name": "refs/heads/master", "committer_date": 1582710167000, "content_id": "8b48baf8cadedc47df836475c3f047437dacde64", "detected_licenses": [ "Apache-2.0" ], "directory_id": "76afa99ad879a2b492558ad6696fe6f3a05707a6", "extension": "py"...
3.296875
stackv2
import hashlib class User(object): def __init__(self, name, password, card_id, money=0, lock=False): self.name = name self.card_id = card_id self.money = money self.lock = lock self.__password = self.__encrypt_password(password) def __str__(self): return '用户名{}...
33
27.64
76
13
211
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d9d684aa994cf7d8_28194cd7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 32 ]
[ null ]
[ 18 ]
[ 42 ]
2024-11-18T20:52:12.028462+00:00
1,693,550,945,000
20b88c10e01e18d374e581420c54a40898add3bc
3
{ "blob_id": "20b88c10e01e18d374e581420c54a40898add3bc", "branch_name": "refs/heads/main", "committer_date": 1693550945000, "content_id": "becd3633bc01b2eef22d36835d511d31d05abb2a", "detected_licenses": [ "Apache-2.0", "BSD-3-Clause", "MIT" ], "directory_id": "b8bbdfc593b6d816e67a344f720f90ec0...
2.515625
stackv2
# # Licensed to the Apache Software Foundation (ASF) under one # or more contributor license agreements. See the NOTICE file # distributed with this work for additional information # regarding copyright ownership. The ASF licenses this file # to you under the Apache License, Version 2.0 (the # "License"); you may not...
88
37.01
104
13
728
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c068aadb9944c9c6_014cc610", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 86 ]
[ null ]
[ 24 ]
[ 100 ]
2024-11-18T20:52:15.118682+00:00
1,404,202,015,000
547dff7576530938a176f79dea1913137154adeb
3
{ "blob_id": "547dff7576530938a176f79dea1913137154adeb", "branch_name": "refs/heads/master", "committer_date": 1404202015000, "content_id": "a61ec4d560898a3aaa62dfb971b5fadd7d044234", "detected_licenses": [ "MIT" ], "directory_id": "6e6407e0cbfa4eaaa3c98379bf06dbbdf2a05e69", "extension": "py", "fi...
2.859375
stackv2
import hashlib from .database_connector import DatabaseConnector def _hash_password(email, password): email = email.encode() password = password.encode() salt = hashlib.sha1(email).hexdigest().encode() hashed_password = hashlib.sha1(password + salt).hexdigest().encode() for i in range(100): ...
28
30.32
76
14
180
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4dbc7f93c54167f4_1b4cc2e2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 9 ]
[ null ]
[ 36 ]
[ 51 ]
2024-11-18T20:52:25.155058+00:00
1,616,521,732,000
80f026455915135cd391ecc4356648bb7c2342d4
3
{ "blob_id": "80f026455915135cd391ecc4356648bb7c2342d4", "branch_name": "refs/heads/master", "committer_date": 1616521732000, "content_id": "b63be193f1fccc562546dac3b32b0a2d14fe8af0", "detected_licenses": [ "MIT" ], "directory_id": "af09971b9023976ea52795a164af47b8c0576d13", "extension": "py", "fi...
2.625
stackv2
from Crypto.Hash import MD5 from Crypto.PublicKey import RSA from Crypto.Util import randpool import pickle import socket import sys #generate the RSA key blah = randpool.RandomPool() RSAKey = RSA.generate(512, blah.get_bytes) RSAPubKey = RSAKey.publickey() #listen for a connection host = '' port = 12345 s = ...
44
22.07
71
10
278
python
[{"finding_id": "codeql_py/weak-crypto-key_6831174c70508c0e_12499dad", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "remediation": "", ...
2
true
[ "CWE-326", "CWE-200" ]
[ "py/weak-crypto-key", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "'' binds a socket to all interfaces." ]
[ 11, 21 ]
[ null, null ]
[ 10, null ]
[ 43, 20 ]
2024-11-18T20:52:30.216918+00:00
1,604,680,380,000
e8cedf7ca1a503f598394006d985b734b85b3780
3
{ "blob_id": "e8cedf7ca1a503f598394006d985b734b85b3780", "branch_name": "refs/heads/main", "committer_date": 1604680380000, "content_id": "704abf8fe7ad97941ff8b2e2c55130ec27e28caf", "detected_licenses": [ "MIT" ], "directory_id": "d571630c7b8aef819ca5587ddeed67dc7eae3365", "extension": "py", "file...
2.671875
stackv2
import json import requests BASE_URL = 'https://payme.uz/api/' class PayMeApi: def __init__(self): pass def _make_request(self, params): response = requests.post(BASE_URL, data=json.dumps(params), verify=False) response_json = response.json() print(response_json) re...
52
21.67
81
15
269
python
[{"finding_id": "codeql_py/request-without-cert-validation_72b27bdfff0116c7_a43ba3e2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 13 ]
[ null ]
[ 20 ]
[ 82 ]
2024-11-18T20:52:42.880068+00:00
1,629,730,085,000
5b94b340766b93e06ed1521d3fe45c835082c880
2
{ "blob_id": "5b94b340766b93e06ed1521d3fe45c835082c880", "branch_name": "refs/heads/master", "committer_date": 1629730085000, "content_id": "ba4fb7ccb5155423a0aaf1b8ef839635d9293686", "detected_licenses": [ "MIT" ], "directory_id": "84adb992857d27d89e327a5edb462f9e3df29bf3", "extension": "py", "fi...
2.328125
stackv2
# encoding: utf-8 # pylint: disable=too-few-public-methods,invalid-name """ RESTful API User resources -------------------------- """ import logging from flask_login import current_user from flask_restplus import Resource import sqlalchemy from app.extensions.api import Namespace, abort, http_exceptions from app.ext...
224
32.61
99
21
1,468
python
[{"finding_id": "codeql_py/log-injection_a4ef8a67934e5380_3e4b69f1", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 136 ]
[ null ]
[ 84 ]
[ 93 ]
2024-11-18T19:02:29.155156+00:00
1,573,780,778,000
2ea02e0a8130b6082c767dffd347b2e6bb77f6d9
2
{ "blob_id": "2ea02e0a8130b6082c767dffd347b2e6bb77f6d9", "branch_name": "refs/heads/master", "committer_date": 1573780778000, "content_id": "183c92896a0f57f8516a2cd39a792e4359a340f9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "984f028cfb5f00d54c3ac44ebcdaea41120ddf4e", "extension": "py"...
2.390625
stackv2
from django.shortcuts import render from django.http import HttpResponseRedirect from QUser.views import * from Buyer.models import * from Shop.models import * import smtplib from email.mime.text import MIMEText def sendMial(content, email): from Qshop.settings import MAIL_SENDER, MAIL_PASSWORD, MAIL_SERVER, MAIL...
404
28.28
107
18
2,686
python
[{"finding_id": "codeql_py/insecure-cookie_28f266fc25126b83_125c9988", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
3
true
[ "CWE-614", "CWE-312", "CWE-1004" ]
[ "py/insecure-cookie", "py/clear-text-logging-sensitive-data", "py/client-exposed-cookie" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "This expression logs [sensitive data (password)](1) as clear text.", "Sensitive server cookie is set without HttpOnly flag." ]
[ 84, 135, 84 ]
[ null, null, null ]
[ 17, 19, 17 ]
[ 56, 27, 56 ]
2024-11-18T19:02:52.325757+00:00
1,632,492,188,000
dab42f5707758c7ff18b64ffd4435c3b287b1932
3
{ "blob_id": "dab42f5707758c7ff18b64ffd4435c3b287b1932", "branch_name": "refs/heads/main", "committer_date": 1632492188000, "content_id": "c71dfe3dda4bf41709796c3baf4fd137a792a527", "detected_licenses": [ "MIT" ], "directory_id": "b2deb6754529915316021ac0fd326963839af0c3", "extension": "py", "file...
2.53125
stackv2
from django.urls import path from django.http import JsonResponse, HttpResponseNotAllowed from banjo import http import json urlpatterns = [] def get_request_params(request): content_type = request.headers.get('Content-Type') if content_type == 'application/json': return json.loads(request.body.decode...
43
30
76
18
264
python
[{"finding_id": "codeql_py/stack-trace-exposure_a319617ef4df3664_65af3fe7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 26 ]
[ null ]
[ 37 ]
[ 54 ]
2024-11-18T19:02:59.916074+00:00
1,321,630,069,000
6d91fc17cf04dca6f50123c68c0332e8ae6040ad
2
{ "blob_id": "6d91fc17cf04dca6f50123c68c0332e8ae6040ad", "branch_name": "refs/heads/master", "committer_date": 1321630069000, "content_id": "3dac83b771bad0ac4ee4b655c85fc4b3b36913e0", "detected_licenses": [ "MIT", "ISC" ], "directory_id": "8b9c327f27a1dd80f9ae2198a3815ecc990ee2e1", "extension": ...
2.40625
stackv2
#!/usr/bin/env python # encoding: utf-8 """ api.py Created by 徐 光硕 on 2011-11-14. Copyright (c) 2011 __MyCompanyName__. All rights reserved. """ import time import datetime from dateutil.parser import * try : import json except ImportError : import simplejson as json import urllib from hashlib import m...
175
34.73
97
23
1,516
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_97f0a42600d7127b_565fe136", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 89 ]
[ null ]
[ 20 ]
[ 23 ]
2024-11-18T19:03:05.316138+00:00
1,486,737,069,000
52484eec8052f0d3289658f94666f243f833e6a7
3
{ "blob_id": "52484eec8052f0d3289658f94666f243f833e6a7", "branch_name": "refs/heads/master", "committer_date": 1486737069000, "content_id": "a48e22d7bb961fa30b10efa23c968f95f0fab96d", "detected_licenses": [ "MIT" ], "directory_id": "a945a9b22c7b96ee69979685d615f4173d7a2ea7", "extension": "py", "fi...
2.671875
stackv2
import base64 import hashlib import hmac def md5(data): return hashlib.md5(data).hexdigest() def get_hmac(password, salt): h = hmac.new(salt, password, hashlib.sha512) return base64.b64encode(h.digest()) def set_attrs_from_dict(obj, dict_, attrs, pop=False): for attr in attrs: if attr in d...
20
20.1
54
12
108
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7423ae7610655730_4f2a8cff", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 11 ]
[ null ]
[ 24 ]
[ 32 ]
2024-11-18T19:14:31.647673+00:00
1,634,045,841,000
99310d2ea325607c95c87ae65d64d4ca2f9f7698
2
{ "blob_id": "99310d2ea325607c95c87ae65d64d4ca2f9f7698", "branch_name": "refs/heads/master", "committer_date": 1634045841000, "content_id": "4f97ba5a2615120b96215dd9a99386e66af93990", "detected_licenses": [ "MIT" ], "directory_id": "2fd4de2f0820f186c735f0619bce2a0318bbfc38", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # @Project : tql-App. # @File : flask_upload # @Time : 2019-11-29 13:22 # @Author : yuanjie # @Email : yuanjie@xiaomi.com # @Software : PyCharm # @Description : from flask import Flask, request, redirect, url_for import os app = Fla...
44
24.8
66
13
328
python
[{"finding_id": "codeql_py/flask-debug_1f42de67516c90f2_e48d735f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 44, 22 ]
[ null, null ]
[ 5, 16 ]
[ 51, 27 ]
2024-11-18T19:14:32.193176+00:00
1,457,739,828,000
e40b731e3854bd4ad7030909d3e08179b4fd1318
3
{ "blob_id": "e40b731e3854bd4ad7030909d3e08179b4fd1318", "branch_name": "refs/heads/master", "committer_date": 1457739828000, "content_id": "a6afed1e9716b71b059b5c1f402b5b1fc9af84de", "detected_licenses": [ "MIT" ], "directory_id": "00563b04ff4f75bc1c72309454dae58788b3e42e", "extension": "py", "fi...
3.390625
stackv2
def my_encryption(some_string): character_set = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 " secret_key = "Dd18Abz2EqNPW hYTOjBvtVlpXaH6msFUICg4o0KZwJeryQx3f9kSinRu5L7cGM" encription = "" for x in some_string: count = 0 for i in character_set: if i == x: encription += secret_key...
18
22.94
82
13
147
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ace0fc3faee9e4e_85039bb5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 18 ]
[ null ]
[ 7 ]
[ 8 ]
2024-11-18T19:14:35.368508+00:00
1,611,171,947,000
faf125e26e966ba9dd28b71f94b99af212385925
3
{ "blob_id": "faf125e26e966ba9dd28b71f94b99af212385925", "branch_name": "refs/heads/master", "committer_date": 1611171947000, "content_id": "bfde4bbc49585ff32abe8c64d0a20219ae9fa2ac", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "3ffd559b29ec5abc4a74acd2543fbdeee5cbdc36", "extension": "p...
2.640625
stackv2
from ecgdetectors import Detectors import data_read from pyhrv.hrv import hrv from pyhrv.time_domain import hr_parameters from pyhrv.frequency_domain import frequency_domain from pyhrv.tools import nn_intervals, plot_ecg, heart_rate, tachogram def heart_rate_variability(sample, lead, rpeak_method = 'string'): cu...
90
34.04
75
11
840
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ee5027f59c6accdb_5baee4bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
14
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 7, 18, 19, 18, 18, 18, 19, 19, 16, 16, 23, 21, 20, 20 ]
[ 9, 33, 35, 33, 33, 33, 35, 35, 34, 34, 43, 39, 37, 38 ]
2024-11-18T19:14:50.039773+00:00
1,535,774,657,000
e9d17ee11c348140b355659cd4454ae70c572c3a
3
{ "blob_id": "e9d17ee11c348140b355659cd4454ae70c572c3a", "branch_name": "refs/heads/master", "committer_date": 1535774680000, "content_id": "ec363735dc15ddda990b8d31589d8dddb9a39f9a", "detected_licenses": [ "MIT" ], "directory_id": "4a814f5243d7db4cb72b10f602a9f30a5c62d14b", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- ''' asyncio 的使用 https://demos.aiohttp.org/en/latest/tutorial.html ''' import asyncio from aiohttp import web async def index(request): await asyncio.sleep(0.5) return web.Response(body='<h1>Index</h1>'.encode('utf-8'), content_type='text/html') async def hello(req...
28
23.18
88
11
189
python
[{"finding_id": "codeql_py/reflective-xss_42b1c40bddd6fc24_4906bc4f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 30 ]
[ 50 ]
2024-11-18T19:27:35.670704+00:00
1,613,528,217,000
3c2da2aa3ccbe9981eb75dcf524fa67ad8f89144
2
{ "blob_id": "3c2da2aa3ccbe9981eb75dcf524fa67ad8f89144", "branch_name": "refs/heads/master", "committer_date": 1613528217000, "content_id": "9a879f860f69964cf5e9779b07c4a5e850ee233a", "detected_licenses": [ "MIT" ], "directory_id": "1520e7ffc29c706293b54635165a1883374a401f", "extension": "py", "fi...
2.359375
stackv2
import datetime as dt from functools import partial import logging from math import isfinite import os import re from typing import Any, NamedTuple, Optional import jinja2 import requests from rich.progress import track from urllib.parse import urljoin from ..._version import get_versions from ...schema import Compou...
270
30.66
97
19
1,894
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2fd8a995ad027e19_68428275", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 169 ]
[ null ]
[ 19 ]
[ 61 ]
2024-11-18T19:27:38.443521+00:00
1,509,824,398,000
34f9631d499015b0e67601a841be8dec04ddbd42
3
{ "blob_id": "34f9631d499015b0e67601a841be8dec04ddbd42", "branch_name": "refs/heads/master", "committer_date": 1509824398000, "content_id": "1c4ccf6b44bbdc0b7ce4fa9f928a00a9e8f91965", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ce6812c0987e98141bb2f94d77a2cb51f1cb666d", "extension": "py"...
2.828125
stackv2
#!/usr/bin/python import webbrowser import os import datetime def stringchecker (orig,v1): ret = True x = len(v1) j=0 for j in range(0,x,1): if(len(v1)<=len(orig)): if orig[j].capitalize() == v1[j] or orig[j]==v1[j]: ret = ret and True elif orig[j] != v1[j]: ret = ret and False ...
380
24.93
141
22
2,360
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_237c044c224c8ab6_fbb9bf9c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
9
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensiti...
[ 46, 330, 367, 293, 195, 83, 119, 271, 158 ]
[ null, null, null, null, null, null, null, null, null ]
[ 31, 31, 31, 31, 31, 31, 31, 32, 31 ]
[ 141, 141, 141, 111, 111, 141, 141, 40, 141 ]
2024-11-18T19:27:39.432517+00:00
1,585,227,673,000
ae7c7c86c1540d5360034266ddd02655e8493e2f
3
{ "blob_id": "ae7c7c86c1540d5360034266ddd02655e8493e2f", "branch_name": "refs/heads/master", "committer_date": 1585227673000, "content_id": "04bbe29adac5ed6d58491960731ee3ad81f0bc8f", "detected_licenses": [ "MIT" ], "directory_id": "5fb9c5bdc773c959834482af75553e65b834d0e9", "extension": "py", "fi...
2.65625
stackv2
#!/usr/bin/env python3 """attach image to scicat""" import os import urllib import json import base64 import requests from get_api import GetApi class ScicatAttach: """attach image to scicat""" api = "" url_fragment = "Datasets" thumbnail = "" file = "data/nicos_00000332.hdf" options = {} ...
118
24.6
74
14
695
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2a4473e494003095_9d14f610", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 49 ]
[ null ]
[ 15 ]
[ 23 ]
2024-11-18T19:27:49.029498+00:00
1,631,584,351,000
07c349137d9989a4b7337c14685930d47d3e8141
2
{ "blob_id": "07c349137d9989a4b7337c14685930d47d3e8141", "branch_name": "refs/heads/main", "committer_date": 1631584351000, "content_id": "3221970d6f59b4f3046f423f5efa5a4593ac507b", "detected_licenses": [ "MIT" ], "directory_id": "cb03cd0464f79b0c60620733baa4589798cca68f", "extension": "py", "file...
2.46875
stackv2
# utilities.py import datetime import math import random from datetime import datetime import aiohttp import discord import toml configFile = toml.load('config.toml') def get_api(): API_KEY = configFile['hypixel']['api_keys'] api = random.choice(API_KEY) return api async def get_data(name): api =...
411
29.9
129
19
3,583
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2215e3189a3e5612_2aaf9d55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 163 ]
[ null ]
[ 29 ]
[ 32 ]
2024-11-18T19:38:45.535416+00:00
1,457,030,171,000
b012990c26821b87bf69bf867e9839e06d40913b
2
{ "blob_id": "b012990c26821b87bf69bf867e9839e06d40913b", "branch_name": "refs/heads/master", "committer_date": 1457030171000, "content_id": "b443ad6e50255770bf8e7e4ede7499a53002b026", "detected_licenses": [ "MIT" ], "directory_id": "13446c5b6cd0b5b3d1b005b5f8f872f0d18599e9", "extension": "py", "fi...
2.453125
stackv2
import sys import requests import json from urlparse import urljoin from lxml import html URL = 'http://www.insolvencydirect.bis.gov.uk/IESdatabase/viewdirectorsummary-new.asp' HEADERS = { 'User-Agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Saf...
37
27.24
141
11
317
python
[{"finding_id": "codeql_py/request-without-cert-validation_9cdba09e87e168d6_9146b45b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 15 ]
[ 42 ]
2024-11-18T19:38:50.563280+00:00
1,522,877,782,000
8a215ed19af52df20e85587d66162281c9533b1b
3
{ "blob_id": "8a215ed19af52df20e85587d66162281c9533b1b", "branch_name": "refs/heads/master", "committer_date": 1522877782000, "content_id": "1a19302bedc3b36f0294983ad85d13c0c997c8a9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1318345bc0458edc981935f074cbfaf7bcf5c929", "extension": "py"...
2.59375
stackv2
from flask import Flask, render_template, request, jsonify import atexit import cf_deployment_tracker import os import json import twitter import time from watson_developer_cloud import PersonalityInsightsV3, ToneAnalyzerV3 # Emit Bluemix deployment event cf_deployment_tracker.track() # Register the "Flask" Applicati...
137
35.44
92
16
1,280
python
[{"finding_id": "codeql_py/flask-debug_9168cfd2d98c484c_20155fa6", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 137, 65, 67, 123 ]
[ null, null, null, null ]
[ 5, 23, 19, 15 ]
[ 51, 46, 42, 38 ]
2024-11-18T20:06:25.919266+00:00
1,582,573,718,000
21983e4c50d4665581c23fa0ea6bcc2e63c2270b
2
{ "blob_id": "21983e4c50d4665581c23fa0ea6bcc2e63c2270b", "branch_name": "refs/heads/master", "committer_date": 1582573718000, "content_id": "64ebc165519d8ac79b8a1ae0a494220bd7db35e3", "detected_licenses": [ "MIT" ], "directory_id": "70848f187c4626079a09152b7c2637e46abd0e17", "extension": "py", "fi...
2.46875
stackv2
from django.http import HttpResponse import json from pokemon import utilities # Create your views here. def searchPokemonInfoByName(request): try: name = request.GET['name'] if len(name) < 4: response = "The minimum character allowed is 4" else: utilities_pokemon...
41
30.76
77
15
258
python
[{"finding_id": "codeql_py/stack-trace-exposure_56bd0c44a6f91867_d28f8c3d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 25, 41 ]
[ null, null ]
[ 25, 25 ]
[ 45, 45 ]
2024-11-18T20:18:13.656789+00:00
1,562,057,400,000
8b7761a19412356e1ee4df86bf7fa149a0c8174a
3
{ "blob_id": "8b7761a19412356e1ee4df86bf7fa149a0c8174a", "branch_name": "refs/heads/master", "committer_date": 1562057400000, "content_id": "d15becac8629e5c1bf4594e5e3f95297e7939e04", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b656715e9ac4d806964bcdccef2f6d32c6dd09db", "extension": "py"...
3.109375
stackv2
from base64 import b64encode, encodebytes from Crypto.Cipher import AES import binascii import hashlib BS = AES.block_size unpad = lambda data: data[0:-ord(data[-1])] def padding_pkcs5(text): count = len(text.encode('utf-8')) add = BS - (count % BS) entext = text + (chr(add) * add) return entext ...
67
28.58
85
13
564
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_3948a86243c189b9_9d9452b6", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 27, 34, 43 ]
[ null, null, null ]
[ 18, 18, 18 ]
[ 55, 55, 48 ]
2024-11-18T20:18:16.243120+00:00
1,613,790,628,000
650c8b6d83f646fa32523d913da07a5170a73c28
3
{ "blob_id": "650c8b6d83f646fa32523d913da07a5170a73c28", "branch_name": "refs/heads/main", "committer_date": 1613790628000, "content_id": "80793fe76fb570d47027694eb6e510b94d0ff882", "detected_licenses": [ "MIT" ], "directory_id": "1c6d4644aafbea2166f0d0c6e983e491a12d32a9", "extension": "py", "file...
2.734375
stackv2
import requests def placa(message): message = message.text.replace('@merkun_bot', '').replace('/placa ', '').replace('-', '') try: request = requests.get( f'https://apicarros.com/v2/consultas/{message}/SEU TOKEN AQUI', verify=False).json() modelo = request.get('modelo') m...
32
26.59
96
14
229
python
[{"finding_id": "codeql_py/request-without-cert-validation_8079f228491a9a49_62868515", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 9 ]
[ 10 ]
[ 19 ]
[ 90 ]
2024-11-18T20:18:19.066020+00:00
1,685,950,274,000
4a96217fe11d7201ed1c2c8295ddb76413b7e149
2
{ "blob_id": "4a96217fe11d7201ed1c2c8295ddb76413b7e149", "branch_name": "refs/heads/master", "committer_date": 1685950274000, "content_id": "04460b35ae3e74174547dac88f67431b76e50889", "detected_licenses": [ "MIT" ], "directory_id": "8a9ebd9d8846d6cc04a90c50f35a07c60282a101", "extension": "py", "fi...
2.484375
stackv2
""" Normalize and parse. """ import os import shutil import sys import tarfile import tempfile import time from normalize_arxiv_dump import normalize from parse_latex_tralics import parse def prepare(in_dir, out_dir, meta_db, tar_fn_patt, write_logs=False): if not os.path.isdir(in_dir): print('input dire...
138
35.07
79
21
1,124
python
[{"finding_id": "codeql_py/tarslip_fa9aef74b32a7a3d_548be796", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 83 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-18T20:18:29.788066+00:00
1,567,898,177,000
4e602b43a6c72f42831aaf88796165017fd476bb
2
{ "blob_id": "4e602b43a6c72f42831aaf88796165017fd476bb", "branch_name": "refs/heads/master", "committer_date": 1567898177000, "content_id": "20852e76d93a2fa31b06a72214ff7003c214bd9d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "3b36989a450d3ce8bc8b32ea2fe4c845326d9b7e", "extension": "p...
2.484375
stackv2
#!/usr/bin/python3 import json import requests from requests import urllib3 import time import pprint as pp import csv import pandas as pd from docx import Document from docx.shared import Inches, Pt from docx.enum.section import WD_ORIENT, WD_SECTION from docx.enum.text import WD_ALIGN_PARAGRAPH from ..models import M...
182
28.35
90
19
1,277
python
[{"finding_id": "codeql_py/request-without-cert-validation_b21ed92e9989b84b_20225ebe", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 24 ]
[ null ]
[ 24 ]
[ 77 ]
2024-11-18T20:31:15.154166+00:00
1,601,625,327,000
d2dc6b0d904cca1c6ca616efcf4390dc19cd355e
2
{ "blob_id": "d2dc6b0d904cca1c6ca616efcf4390dc19cd355e", "branch_name": "refs/heads/master", "committer_date": 1601625327000, "content_id": "a3e44228f1943809a7b599c99f9fa7395fb81146", "detected_licenses": [ "MIT" ], "directory_id": "2a21faa26473757e22a1ad5e1c15f840b7a0ec22", "extension": "py", "fi...
2.421875
stackv2
from flask import render_template,flash, request, redirect, url_for from flask_login import login_user, logout_user,login_required from app.auth import auth from app.models import User from .forms import RegForm,LoginForm from ..email import mail_message from .. import db @auth.route('/login',methods = ['POST','GET'])...
49
39.27
165
16
415
python
[{"finding_id": "codeql_py/url-redirection_bac65bfd4fc6f373_15a7fdc1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-18T20:31:18.476113+00:00
1,620,048,547,000
bafd061303552b75cd3b09c39eb712afdebfd144
3
{ "blob_id": "bafd061303552b75cd3b09c39eb712afdebfd144", "branch_name": "refs/heads/main", "committer_date": 1620048547000, "content_id": "1bf1f51e4b7baf04e574af4d361972f1efcab2d2", "detected_licenses": [ "MIT" ], "directory_id": "c6d19cc339e76ab98420bccdc18a2c9f14fe6411", "extension": "py", "file...
2.546875
stackv2
import os from flask import * from werkzeug.utils import secure_filename from flask import send_from_directory import json from flask_cors import CORS app = Flask(__name__) CORS(app, supports_credentials=True) CORS(app, resources=r'/*') UPLOAD_FOLDER = './uploads' ALLOWED_EXTENSIONS = set(['txt', 'pdf', 'png', 'jpg', ...
57
29.26
95
16
405
python
[{"finding_id": "codeql_py/reflective-xss_8fe1ef2649a05847_e73ba752", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 54 ]
[ null ]
[ 21 ]
[ 69 ]
2024-11-18T20:31:33.172579+00:00
1,574,707,785,000
174dd7d79dff1f6de28d79638cf54127581784b3
3
{ "blob_id": "174dd7d79dff1f6de28d79638cf54127581784b3", "branch_name": "refs/heads/master", "committer_date": 1574707785000, "content_id": "358e61e63e0a26f726620f2c649aa2fe8c360738", "detected_licenses": [ "Unlicense" ], "directory_id": "71c15a6e1c1838a0c785ee5bd024b7601db8828a", "extension": "py",...
2.53125
stackv2
import csv from datetime import datetime import PySimpleGUI as sg # CONFIG standard_shipping = 'FedEx' standard_service = 'Ground' stamp = datetime.now().strftime('%Y%m%d') export_file_name = f"order_import_{stamp}.txt" def main(): layout = [ [sg.Text('Shopify to 3PL Central Order Converter', size=(0,1), ...
156
29.86
119
18
1,088
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e2ab6ef08a74440b_741e93b1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 35 ]
[ null ]
[ 17 ]
[ 21 ]
2024-11-18T20:43:24.216338+00:00
1,565,437,922,000
d269cf7d3b4e39e69443a16f12fbc23863317c5f
3
{ "blob_id": "d269cf7d3b4e39e69443a16f12fbc23863317c5f", "branch_name": "refs/heads/master", "committer_date": 1565437922000, "content_id": "d236011d5f9dd5d3a141bb6745680f3a9751ebf1", "detected_licenses": [ "MIT" ], "directory_id": "bd59d93ce767553a1028b69477b6c794e60a2787", "extension": "py", "fi...
3.390625
stackv2
#!/usr/bin/python3 # **5. Mac Address Lookup** - This tool will return information on mac addressses. # - This tool will use the urllib2, json, and codecs modules. # - This tool will make an api call with mac address to http://macvendors.co/api # - It will take stndin from user. # - It will return a report in ...
59
26.76
106
15
424
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_643fc2297f17a532_9412f355", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 49 ]
[ null ]
[ 11 ]
[ 40 ]
2024-11-18T20:43:26.727714+00:00
1,576,783,058,000
7790414846a4079f8676e1ddbc24bd7efbed6c5f
2
{ "blob_id": "7790414846a4079f8676e1ddbc24bd7efbed6c5f", "branch_name": "refs/heads/master", "committer_date": 1576783058000, "content_id": "9202de90ef43aa613c0327ad4760df26ea79a9f1", "detected_licenses": [ "MIT" ], "directory_id": "538e99d6fcabad52248c2c5291ddb8dae2049e61", "extension": "py", "fi...
2.328125
stackv2
import os import numpy as np import facenet import cv2 import tensorflow as tf import urllib import tarfile MODEL_FILE = 'https://storage.googleapis.com/esper/models/facenet/20170512-110547.tar.gz' EMBEDDING_SIZE = 128 def temp_directory(): directory = os.path.expanduser('~/.vas/resources') os.makedirs(direc...
107
35.28
107
19
900
python
[{"finding_id": "codeql_py/tarslip_d8eb9c0ced2ed26b_f9360397", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 30 ]
[ null ]
[ 13 ]
[ 18 ]
2024-11-18T20:58:04.231480+00:00
1,376,669,431,000
f346cba6152972f4273453437abd18ee858e072c
3
{ "blob_id": "f346cba6152972f4273453437abd18ee858e072c", "branch_name": "refs/heads/master", "committer_date": 1376669431000, "content_id": "a78ae1a2cff74dbbf32e6bbb1590cbf088a41b97", "detected_licenses": [ "Artistic-2.0" ], "directory_id": "7d0a1b67dc8700617a942af32e2f0172662d711b", "extension": "p...
2.671875
stackv2
import web import requests import httplib, base64 urls = ( '/', 'index', '/(.*)', 'found' ) render = web.template.render('templates/') class index: def GET(self): render.index() class found: def GET(self, screen_name): g = get_user() found_user = g.found_user() render...
117
34.74
138
15
957
python
[{"finding_id": "codeql_py/request-without-cert-validation_805c0ee4b38b680a_f1a6afc4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 71, 81, 88, 99, 108 ]
[ null, null, null, null, null ]
[ 13, 13, 13, 13, 17 ]
[ 107, 121, 120, 139, 82 ]
2024-11-18T20:58:10.289437+00:00
1,527,073,081,000
ebeec4ec50fc13b0598a3e9214315a648c4a1a1f
2
{ "blob_id": "ebeec4ec50fc13b0598a3e9214315a648c4a1a1f", "branch_name": "refs/heads/master", "committer_date": 1527073081000, "content_id": "16a73c81ee28a8110893ada31a2d9f546e1c5b7b", "detected_licenses": [ "MIT" ], "directory_id": "4c47dff7c25f22d2ec49db63d3f171838446438e", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import config debug = config.debug import sys if debug : print('initializing...', flush=True, file=sys.stderr) import os import json import netifaces from http.server import BaseHTTPRequestHandler, HTTPServer import pychromecast import gtts media_contoller = None s...
153
38.45
138
16
1,224
python
[{"finding_id": "codeql_py/path-injection_c3da6b9827802546_b4255ce0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 125, 135 ]
[ null, null ]
[ 40, 60 ]
[ 48, 68 ]
2024-11-18T21:10:14.142986+00:00
1,684,823,007,000
073c91ceb7612f9a895756737da042dc8445d73a
2
{ "blob_id": "073c91ceb7612f9a895756737da042dc8445d73a", "branch_name": "refs/heads/main", "committer_date": 1684823007000, "content_id": "9047561ee6180475f23beeed8b9229851446ace0", "detected_licenses": [ "MIT" ], "directory_id": "189c2fdefb78be9c5fc6d2b9d86bb44c04512a49", "extension": "py", "file...
2.359375
stackv2
from .base import BaseDataset from ..util import ivecs_read, fvecs_read from urllib.request import urlretrieve import tarfile class Sift1m(BaseDataset): def __init__(self, path): super().__init__(path=path) def download(self): self.path.mkdir(exist_ok=True, parents=True) tar_path = s...
60
33.8
87
18
438
python
[{"finding_id": "codeql_py/tarslip_e925073320ae775d_2d731f7c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 37 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-18T21:10:33.033026+00:00
1,627,473,753,000
c009034ed2276366de47f8a8285d899fc079ffb0
3
{ "blob_id": "c009034ed2276366de47f8a8285d899fc079ffb0", "branch_name": "refs/heads/main", "committer_date": 1627473753000, "content_id": "7b01ed1a7b24dc0ce0d6a92fc6442d342fda29cc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "00b0e12adbcdee95c0608f12c3f224976745e997", "extension": "py", ...
2.65625
stackv2
import os import sys import math import cv2 from tqdm import tqdm import requests from zipfile import ZipFile import json from PIL import Image import matplotlib.pyplot as plt import tarfile import os import datetime import csv ######### Download Dataset and Annotations ########### def download_dataset(thetarfile, tar...
161
32.61
108
18
1,218
python
[{"finding_id": "codeql_py/tarslip_288f9f0e4a6e62d7_64b11d17", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 34 ]
[ null ]
[ 5 ]
[ 11 ]
2024-11-18T21:10:58.013328+00:00
1,622,152,255,000
d808d694ccf7208780ebae166110daba5dc952b9
2
{ "blob_id": "d808d694ccf7208780ebae166110daba5dc952b9", "branch_name": "refs/heads/master", "committer_date": 1622152255000, "content_id": "3e7c66a2086be8ba7df9ac71fda7840c1fc75c96", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f9d4c301b4994994c45d9435bdfa73147ad53e49", "extension": "p...
2.359375
stackv2
"""The Firestarter Connector connects to Firehose and writes the output to a kafka topic """ import asyncio import json import os import ssl import time import warnings import zlib from typing import Optional, Tuple from confluent_kafka import KafkaException, Producer # type: ignore CONNECTION_ERROR_LIMIT = 3 COMPR...
310
34.21
107
19
2,512
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0bb7908a0eb66b0e_26b14aa2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 201 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-18T21:11:01.509755+00:00
1,608,101,878,000
e776e7d7bdc7de4bbcb8331eb6bd80b0b224c7d5
4
{ "blob_id": "e776e7d7bdc7de4bbcb8331eb6bd80b0b224c7d5", "branch_name": "refs/heads/main", "committer_date": 1608101878000, "content_id": "3b2d173ff0a76157a0db19a6c8b48ca4a5398adf", "detected_licenses": [ "MIT" ], "directory_id": "d74afd5c1d64fa8174d02d85f337e36addfaaf67", "extension": "py", "file...
3.515625
stackv2
data = open("day2.txt").read().splitlines() def part_one(): passwords = 0 for x in data: y = x.split(" ") y[1] = y[1].strip(":") counter = y[2].count(y[1]) number_range = y[0].split("-") if counter in range(int(number_range[0]), int(number_range[1]) + 1): pas...
27
27.11
76
15
224
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a24fb05168514682_b3852f4d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 26, 27 ]
[ null, null ]
[ 7, 7 ]
[ 17, 17 ]
2024-11-18T21:11:07.349225+00:00
1,464,336,327,000
1fa9b2d4398c6161cb6e27e20e4291ec599994ea
3
{ "blob_id": "1fa9b2d4398c6161cb6e27e20e4291ec599994ea", "branch_name": "refs/heads/master", "committer_date": 1464336327000, "content_id": "27506e50c794f92f1b6468ffd4d73f302246d996", "detected_licenses": [ "MIT" ], "directory_id": "991c9cb3927c59d6938dd3b3beac56fda6a4b180", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # # User Module. # Including User class and reading/writing implementations # import re, os, json, time import config from hashlib import md5 class User: def __init__(self, src, password=None): ''' Create one User instance from a Dict or String obje...
96
24.82
77
16
587
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9916c2769e75f86a_31cf7e2e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 45 ]
[ null ]
[ 38 ]
[ 65 ]