added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T03:24:42.601180+00:00
1,589,150,485,000
6c5d6b202427880bd45537485d8b332dd9d7330e
3
{ "blob_id": "6c5d6b202427880bd45537485d8b332dd9d7330e", "branch_name": "refs/heads/master", "committer_date": 1589150485000, "content_id": "e03ca44196e9918b1f7b7452670097d67ea4e6f9", "detected_licenses": [ "MIT" ], "directory_id": "e2b9786b94e973c03b286e179b05bbb4c2c3ddad", "extension": "py", "fi...
2.65625
stackv2
import stackless from jinja2 import Environment, PackageLoader class JinjaRequest(object): def __init__(self, data): self.data = data self.channel = stackless.channel() class JinjaProcessor(object): def __init__(self): self.in_channel = stackless.channel() self.environment =...
51
26.29
71
15
267
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_904541a7401afb71_5b138217", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ 20 ]
[ 28 ]
[ 10 ]
2024-11-19T03:24:56.685313+00:00
1,693,388,042,000
a30fa1513d6a1b60bf5a50aba6ccd8807066cc0c
2
{ "blob_id": "a30fa1513d6a1b60bf5a50aba6ccd8807066cc0c", "branch_name": "refs/heads/master", "committer_date": 1693388042000, "content_id": "bbdb6c144cfd4032eb32c3c578a505eee6a18a62", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e124b63c8542da816e03ef5177112fc7af4d91a8", "extension": "py"...
2.3125
stackv2
''' Copyright (c) 2017 HERE Europe B.V. See the LICENSE file in the root of this project for license details. ''' from abc import ABCMeta, abstractmethod from jinja2 import Environment, PackageLoader from jinja2 import nodes from jinja2.ext import Extension from jinja2.exceptions import TemplateRuntimeError from fl...
86
44.28
102
16
823
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b518db33abd79c84_60bd6be9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 40 ]
[ 41 ]
[ 15 ]
[ 91 ]
2024-11-19T01:37:34.718261+00:00
1,543,942,197,000
57fe7233cce0c3c9586cf3589374e54a1dfc24f0
3
{ "blob_id": "57fe7233cce0c3c9586cf3589374e54a1dfc24f0", "branch_name": "refs/heads/master", "committer_date": 1543942197000, "content_id": "c0ec56fe7aabe67b283fac1b4d225a74803f6615", "detected_licenses": [ "MIT" ], "directory_id": "df5183e60cd3de2dd49a122b2ecbd35bc8c3383f", "extension": "py", "fi...
2.5625
stackv2
import requests import json class SplunkHTTPEventCollector(object): """ method for leveraging the splunk HTTP Event Collector. """ @classmethod def eventpost(cls, splunkurl, event, sourcetype, token): cls.token = token cls.event = event cls.sourcetype = sourcetype ...
22
34.5
104
14
200
python
[{"finding_id": "codeql_py/request-without-cert-validation_e409701492b1ffa1_fc4ed485", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 13 ]
[ 105 ]
2024-11-19T01:37:53.642125+00:00
1,495,384,131,000
56ebed1169963df645da9a9d691076143ff065e4
3
{ "blob_id": "56ebed1169963df645da9a9d691076143ff065e4", "branch_name": "refs/heads/master", "committer_date": 1495384131000, "content_id": "93787c33bd009c7abca7df9799f3a5a0210375dd", "detected_licenses": [ "MIT" ], "directory_id": "197d65e432ebf1cc0a071dee284aa138968314d6", "extension": "py", "fi...
2.953125
stackv2
import urllib.request, urllib.parse, urllib.error import logging from bs4 import BeautifulSoup def search(query): url = 'https://duckduckgo.com/html/?q={}'.format(urllib.parse.quote_plus(query)) try: resp = urllib.request.urlopen(url) except Exception as e: logging.info('DuckDuckGo: {}'.fo...
37
31.84
93
13
299
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b9b9af19d9a01e5b_e71eee4a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://duckduckgo.com](1) may be at an arbitrary posi...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://duckduckgo.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 30 ]
[ null ]
[ 8 ]
[ 58 ]
2024-11-19T01:38:28.174513+00:00
1,610,153,327,000
9b52f54a99ff3ca4a729539a63a8b31e4c2eb58a
2
{ "blob_id": "9b52f54a99ff3ca4a729539a63a8b31e4c2eb58a", "branch_name": "refs/heads/main", "committer_date": 1610153327000, "content_id": "6e4fae45eeb6a2ab11d79369e4cd830dbbb0d15f", "detected_licenses": [ "MIT" ], "directory_id": "af4abf0a22db1cebae466c56b45da2f36f02f323", "extension": "py", "file...
2.390625
stackv2
# AVL Mode Package # Released under MIT License # Copyright (c) 2020 TytusDb Team # Developers: SG#16 import csv import os import pickle import re import shutil class Handler: # Databases @staticmethod def rootinstance() -> list: if not os.path.exists('data'): os.makedirs('data') ...
109
27.43
100
21
755
python
[{"finding_id": "codeql_py/overly-large-range_215d8605508d4d03_83d31eae", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 87, 89 ]
[ null, null ]
[ 32, 36 ]
[ 35, 39 ]
2024-11-19T01:38:33.687129+00:00
1,535,231,638,000
d5f47c5383de3c8a04830f06ffbeb7e82fd4a70d
3
{ "blob_id": "d5f47c5383de3c8a04830f06ffbeb7e82fd4a70d", "branch_name": "refs/heads/master", "committer_date": 1535231638000, "content_id": "e5b1bcfb13b2b0230f43e8dba7882ebe5257d5d7", "detected_licenses": [ "MIT" ], "directory_id": "65768c410fe403593569ed046c6ee486f531a91d", "extension": "py", "fi...
2.625
stackv2
import psycopg2 import time import os from neorpc.Settings import SettingsHolder from Client import RPCClient, RPCEndpoint import socket import requests import json client = RPCClient() class NodeObject: def __init__(self, node_id, url, ip): self.node_id = node_id self.url = url self.ip =...
284
36.35
146
19
2,500
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af5c5dd89af1fe81_54763c92", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 50 ]
[ null ]
[ 11 ]
[ 22 ]
2024-11-19T01:38:35.366275+00:00
1,592,610,134,000
3b99f7df359a5c3051830e5cfadabf1cf9dc0a96
3
{ "blob_id": "3b99f7df359a5c3051830e5cfadabf1cf9dc0a96", "branch_name": "refs/heads/master", "committer_date": 1592610134000, "content_id": "fe7905a691a888a4dd2baa4cafea5e13476aebf1", "detected_licenses": [ "MIT" ], "directory_id": "236e0e1376b97c8789c9382424cfe784f5dc910b", "extension": "py", "fi...
2.875
stackv2
#!/usr/bin/env python3 """ @author: Katherine Eaton Geocode addresses in a tsv file. ./geocode_NextStrain.py \ --in-tsv ../metadata_assembly_nextstrain_edit_name.tsv \ --loc-col BioSampleGeographicLocation \ --out-tsv ../metadata_assembly_nextstrain_edit_name_geocode.tsv \ --out-lat-lon ../metadata_assem...
225
39.63
115
22
1,738
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_be8fc1e51ac8232e_f38ac8f2", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text.", "This expression stores [sensitive d...
[ 185, 205, 214 ]
[ 188, 208, 217 ]
[ 20, 40, 36 ]
[ 52, 62, 58 ]
2024-11-19T01:38:46.537321+00:00
1,597,497,261,000
64634cac37f28a07a73a16cb2daf46bd14bbcb69
3
{ "blob_id": "64634cac37f28a07a73a16cb2daf46bd14bbcb69", "branch_name": "refs/heads/master", "committer_date": 1597497261000, "content_id": "0963410d47b12be3df9b676735d536dd39e0c81f", "detected_licenses": [ "MIT" ], "directory_id": "af372f845d10953c48c33b6c486b13be90e09766", "extension": "py", "fi...
2.53125
stackv2
import torch from torchvision.datasets import VisionDataset from torchvision.datasets.utils import check_integrity import os import numpy as np from glob import glob import PIL class Chairs(VisionDataset): # There currently does not appear to be a easy way to extract 7z in python (without introducing additional ...
79
35.2
110
17
635
python
[{"finding_id": "codeql_py/tarslip_62ae68a2202b0b60_5c23aa16", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 61 ]
[ null ]
[ 17 ]
[ 18 ]
2024-11-19T01:51:55.617313+00:00
1,609,751,385,000
d9d8a95a03f076f51c2bcb04e2f0ace3b84635a8
2
{ "blob_id": "d9d8a95a03f076f51c2bcb04e2f0ace3b84635a8", "branch_name": "refs/heads/master", "committer_date": 1609751385000, "content_id": "59663ec7c603b5ea9b49bac32280f03eae09650c", "detected_licenses": [ "MIT" ], "directory_id": "d4920e66ec65a2700b549ffab6e04cfafebc0879", "extension": "py", "fi...
2.484375
stackv2
import threading import queue import logging import time import random import paramiko from typing import List from nornir.core.task import AggregatedResult, Task from nornir.core.inventory import Host log = logging.getLogger(__name__) LOCK = threading.Lock() class RetryRunner: """ RetryRunner is a modifica...
324
42.28
132
21
2,724
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_14ed931254d51399_0079c36c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 88 ]
[ 90 ]
[ 17 ]
[ 18 ]
2024-11-19T01:52:04.323023+00:00
1,675,391,267,000
e60986c9d17595b392206db0482a8fe09b3957a4
2
{ "blob_id": "e60986c9d17595b392206db0482a8fe09b3957a4", "branch_name": "refs/heads/master", "committer_date": 1675391267000, "content_id": "32fbdf28e84f8fed0bf570936b0f888f41308e50", "detected_licenses": [ "MIT" ], "directory_id": "618fcd4acf01245b10f2ebdab9914c593f1f548c", "extension": "py", "fi...
2.375
stackv2
# decrypt encrypted responses ca 20221221 # handle hidden encryption key 20230116, 20230123, 20230126 from json import loads from random import randrange import re import sys import time from base64 import b64decode import hashlib try: from Cryptodome.Cipher import AES from Cryptodome.Util.Padding import unpa...
195
32.99
109
17
1,825
python
[{"finding_id": "codeql_py/redos_f210623410eb59bc_9286382d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'contextadispatcherastores=JSONapa...
3
true
[ "CWE-1333", "CWE-1333", "CWE-327" ]
[ "py/redos", "py/redos", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'contextadispatcherastores=JSONaparse' and containing many repetitions of '\\n'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'concat(t.' and containing many repet...
[ 154, 158, 66 ]
[ null, null, null ]
[ 54, 36, 27 ]
[ 57, 39, 35 ]
2024-11-19T01:52:16.597035+00:00
1,585,502,331,000
68272fc0a26c16a93c5994584bc7b0da9a3fed58
3
{ "blob_id": "68272fc0a26c16a93c5994584bc7b0da9a3fed58", "branch_name": "refs/heads/master", "committer_date": 1585502331000, "content_id": "14c03eea30912ee7e2c90d42c05b397a618f1ac3", "detected_licenses": [ "MIT" ], "directory_id": "608322dd3562b2c43aab1d1e893c820b829652d8", "extension": "py", "fi...
2.75
stackv2
import os import sqlite3 import getpass import random import string from sqlite3 import Error from prettytable import PrettyTable from password_generator import PasswordGenerator sql_file ="forget.db" def create_connection(db_file): try: conn = sqlite3.connect(db_file) return conn except Error as e: print(e...
160
22.12
82
15
959
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e8350553bd2ee28a_0973c3f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 93 ]
[ null ]
[ 10 ]
[ 58 ]
2024-11-19T01:52:20.509800+00:00
1,648,613,386,000
ee0a01797d70e726678a8252ca79a9c3efdac9c6
3
{ "blob_id": "ee0a01797d70e726678a8252ca79a9c3efdac9c6", "branch_name": "refs/heads/master", "committer_date": 1648613386000, "content_id": "0786373454b0e009de2f0031220db896dcafcd96", "detected_licenses": [ "MIT" ], "directory_id": "b84a4823032021a44568581877f525280c1cb331", "extension": "py", "fi...
2.609375
stackv2
from flask import Flask, send_file, send_from_directory,make_response import os import json import pandas as pd app = Flask(__name__) app.config['JSON_AS_ASCII'] = False @app.route('/') def index(): return 'Index Page' @app.route("/download/<filename>", methods=['GET']) def download_file(filename): # 需要知道2个...
67
27.76
97
14
551
python
[{"finding_id": "codeql_py/path-injection_6c8abe486e361f13_24df8c29", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 35, 47 ]
[ null, null ]
[ 15, 15 ]
[ 68, 70 ]
2024-11-19T01:52:24.617996+00:00
1,590,113,053,000
903589e4c4ae8f4d2c4991af818be42dc8882197
3
{ "blob_id": "903589e4c4ae8f4d2c4991af818be42dc8882197", "branch_name": "refs/heads/master", "committer_date": 1590113053000, "content_id": "eed462ec3a7c409f7742106b4ce1d3f13b0454ae", "detected_licenses": [ "MIT" ], "directory_id": "33be842ca68a26183dfa5947aa6b432e077493ed", "extension": "py", "fi...
2.96875
stackv2
import bcrypt import base64 import hashlib import mysql.connector from mysql.connector import errorcode def add_user(username, email, password, db, bcrypt_rotate=14): # user_id (auto increment), first_name, last_name, email, phone_number, username, password add_user_query = ("INSERT INTO user " ...
52
42.44
116
17
499
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b9fa72f4c1f400b5_ec4d82ee", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 19 ]
[ null ]
[ 60 ]
[ 68 ]
2024-11-19T02:04:41.535017+00:00
1,606,249,066,000
c9e125d99499a276778300d9fdf4469a95ddc69a
3
{ "blob_id": "c9e125d99499a276778300d9fdf4469a95ddc69a", "branch_name": "refs/heads/master", "committer_date": 1606249066000, "content_id": "6424bc11ccd0497d7ba91790fb4e01fb683199a6", "detected_licenses": [ "MIT" ], "directory_id": "aa49bbde374bb7ffc3d1537ea9bfdb74d5862070", "extension": "py", "fi...
2.546875
stackv2
# encoding: utf-8 import re import jinja2 import jinja2.ext import markdown2 import os import sys sys.path.append(".") from staticjinja import make_site from BeautifulSoup import BeautifulSoup, BeautifulStoneSoup # remove annoying characters def cleanitup(text): chars = { '\xe2': '', '\x80': '', '...
114
29.48
72
15
932
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_53cff58b4f849b2e_e156f418", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 77 ]
[ null ]
[ 7 ]
[ 58 ]
2024-11-19T02:04:45.861984+00:00
1,592,976,585,000
3aa2472ed362e773a8b903a483e1f8eb9976e772
2
{ "blob_id": "3aa2472ed362e773a8b903a483e1f8eb9976e772", "branch_name": "refs/heads/master", "committer_date": 1592976585000, "content_id": "c5ef325c5f9bb40c1fb49d455fdfbdce1d50222d", "detected_licenses": [ "MIT" ], "directory_id": "5ec1eac4c9eae176630be81e7e70a75352ef2f06", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- from urllib import request, parse import json import base64 import re import os import shutil import getpass import sys import time def connect_network(): url = 'http://10.255.255.13/index.php/index/login' user_agent = 'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleW...
59
35.53
143
19
617
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bc38f00f18516025_0e7fc220", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 46 ]
[ 48 ]
[ 17 ]
[ 143 ]
2024-11-19T02:04:47.919465+00:00
1,531,040,741,000
758cce6b6f7233edf97e9a57c0a4e3e2efc0750f
3
{ "blob_id": "758cce6b6f7233edf97e9a57c0a4e3e2efc0750f", "branch_name": "refs/heads/master", "committer_date": 1531040741000, "content_id": "5ff438befb1d8d4743a8f3db336eabc70aad858d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "47ce2a03b800e52e521880fb1a61f4a0b7947075", "extension": "py"...
2.546875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import translator import logging import os import json COMMOND_GEN_EXCEL = 'gen_excel' COMMOND_GEN_XML = 'gen_xml' COMMOND_TRANSLATE = 'translate' COMMOND_STATUS = 'status' COMMOND_HELP ='help' COMMOND_EXIT = 'exit' API_CONFIG_FILE_PAHT = 'config.json' def run_commond(...
171
28.09
125
31
1,388
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_45e3ab9d42b2e39e_ccf0a01e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 166 ]
[ null ]
[ 19 ]
[ 47 ]
2024-11-19T02:28:04.726734+00:00
1,557,125,369,000
cd592ed1886d84da56d9670730de4b197ffa79ea
2
{ "blob_id": "cd592ed1886d84da56d9670730de4b197ffa79ea", "branch_name": "refs/heads/master", "committer_date": 1557125369000, "content_id": "7caaeaf2b8e559663c3ded3b11c8ef53f325660e", "detected_licenses": [ "BSD-3-Clause", "Apache-2.0", "MIT" ], "directory_id": "2ce4e110ce17de5aa998f335c85bac9...
2.328125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ License: MIT license Copyright (c) <2016> <MaskedW [maskedw00@gmail.com]> Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, i...
157
25.66
79
16
1,076
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5cea3663ea5aab1e_6205b7c4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 152, 156 ]
[ null, null ]
[ 11, 11 ]
[ 44, 44 ]
2024-11-19T02:28:51.984173+00:00
1,522,965,693,000
e28c82101e0c96e60723696696ebacd7f1b0d6c4
3
{ "blob_id": "e28c82101e0c96e60723696696ebacd7f1b0d6c4", "branch_name": "refs/heads/master", "committer_date": 1522965693000, "content_id": "113d059e0f6151b454d56fef434025fc50833650", "detected_licenses": [ "Apache-2.0" ], "directory_id": "93231556e579c70048aaf206fc38855e89d470a6", "extension": "py"...
2.625
stackv2
#TeamG - Waste #imports the necessary modules for it to work #commenting and context also provided by looking at Flask documentation online import os import json import getpass from flask import Flask, jsonify, request #imports the flask class from watson_developer_cloud import VisualRecognitionV3 '''Authentication...
47
38.72
116
16
483
python
[{"finding_id": "codeql_py/flask-debug_16a5c643c8b6e05c_5ad378e1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 47, 32 ]
[ null, null ]
[ 2, 24 ]
[ 53, 28 ]
2024-11-19T02:36:56.298557+00:00
1,509,971,506,000
a2fc8d86313ab38b3d5a66f84b7c47b759cf1aa7
3
{ "blob_id": "a2fc8d86313ab38b3d5a66f84b7c47b759cf1aa7", "branch_name": "refs/heads/master", "committer_date": 1509971506000, "content_id": "db8f751b095df781d248c5fb7b366678266464d0", "detected_licenses": [ "MIT" ], "directory_id": "e9b2f78ea5cffd03f6b64f6cd777ffce79632a82", "extension": "py", "fi...
2.71875
stackv2
#/usr/bin/python # # HTTP server with a HTML form that allows to upload files to the server. # Files are stored in a folder named "files" inside the current directory. from os import curdir from os.path import join as pjoin from http.server import BaseHTTPRequestHandler, HTTPServer from cgi import FieldStorage upl...
57
25.81
74
17
347
python
[{"finding_id": "codeql_py/path-injection_d2a6dc3a0411e4a7_20d6d637", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 44 ]
[ null ]
[ 18 ]
[ 23 ]
2024-11-19T02:37:06.773378+00:00
1,446,534,290,000
e839169ec20d2a20ccac4d435cf1f104abdd68c9
2
{ "blob_id": "e839169ec20d2a20ccac4d435cf1f104abdd68c9", "branch_name": "refs/heads/master", "committer_date": 1446534350000, "content_id": "db017eaa16e1ece5afca50d286c495de49fc13ff", "detected_licenses": [ "MIT" ], "directory_id": "426971e99e55c9a0594fdde68000c9a391cd40ff", "extension": "py", "fi...
2.4375
stackv2
from flask import Flask, request, Response import urllib2 from calendarprocessor import process_calendar app = Flask(__name__) @app.route('/') def get_processed_calendar(): kintoken = request.args.get('token', '') if kintoken == '': return 'No token supplied', 403 try: calendarFile = urllib2.urlopen(ur...
27
27.63
101
17
201
python
[{"finding_id": "codeql_py/flask-debug_af920b8d06be17f8_eab38319", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 27, 14 ]
[ null, 17 ]
[ 3, 36 ]
[ 22, 6 ]
2024-11-19T02:37:10.947259+00:00
1,506,931,532,000
dd0f61e1e340fe3aef2b89f72d6c7f8c32951a3b
3
{ "blob_id": "dd0f61e1e340fe3aef2b89f72d6c7f8c32951a3b", "branch_name": "refs/heads/master", "committer_date": 1506931532000, "content_id": "d93150f7829146c7a11da287c51fd5d591f0d4d6", "detected_licenses": [ "MIT" ], "directory_id": "24c4273a87c85103b70dc4959c3574221cb6c8e5", "extension": "py", "fi...
2.609375
stackv2
# essential Flask modules from flask import Flask from flask import request from flask import render_template from flask import session from flask import redirect # for reading the config file import yaml # for generating SQL queries in pure Python import sql # for interfacing with the PostgreSQL database import psycop...
177
21.99
83
16
1,025
python
[{"finding_id": "codeql_py/reflective-xss_3bf776e8e33d6b21_5cd88a08", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 45, 133 ]
[ null, null ]
[ 10, 9 ]
[ 29, 21 ]
2024-11-19T02:37:14.179767+00:00
1,543,638,540,000
bacabb82fea35908e477f5b5f28cb0e0b32cf252
3
{ "blob_id": "bacabb82fea35908e477f5b5f28cb0e0b32cf252", "branch_name": "refs/heads/master", "committer_date": 1543638540000, "content_id": "2d1698e2cfd527d37f88d8ba5197fe5284562086", "detected_licenses": [ "MIT" ], "directory_id": "d068d929d0824de7cfda8640a8c974d3679a633c", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python import os import random import requests import subprocess import argparse import datetime import time import sys """Based off https://github.com/fogleman/primitive/blob/master/bot/main.py """ with open(os.path.expanduser('~/.flickr_api_key'), 'r') as key_file: FLICKR_API_KEY = key_file.read...
196
26.63
116
17
1,336
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fdd58757e6acf56f_26e257ec", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 114 ]
[ null ]
[ 18 ]
[ 27 ]
2024-11-19T02:37:17.456520+00:00
1,680,032,345,000
795159fc64ff95c7c8c974f94cdd6ee981496919
3
{ "blob_id": "795159fc64ff95c7c8c974f94cdd6ee981496919", "branch_name": "refs/heads/main", "committer_date": 1680033272000, "content_id": "97db1fd59e45fcea7eb283bf30e081c7ac93a251", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3f5f2bad9f6ab4acd56c4e2929cee1af4a242e57", "extension": "py", ...
2.625
stackv2
# # _author_ = Trevor Squillario <Trevor.Squillario@Dell.com> # # Copyright (c) 2022 Dell EMC Corporation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licens...
200
39.73
112
21
1,766
python
[{"finding_id": "codeql_py/request-without-cert-validation_8a39b8f2a5f1a187_435a606d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 66, 83, 116 ]
[ 68, null, 118 ]
[ 20, 20, 23 ]
[ 50, 79, 70 ]
2024-11-19T02:37:23.314442+00:00
1,566,008,995,000
78f3beb83872baf0236aae94c78107efe7fb0feb
3
{ "blob_id": "78f3beb83872baf0236aae94c78107efe7fb0feb", "branch_name": "refs/heads/master", "committer_date": 1566008995000, "content_id": "5972ecfc2f8cfebdd212908283e99459c1e17b1d", "detected_licenses": [ "MIT" ], "directory_id": "72c4109ae0dd779004f4a24346ee0c7822a99e11", "extension": "py", "fi...
2.734375
stackv2
# LOPEXTftp-v1a.py(w) (18-10-2018) # For External uploading of the LOPORA pictures # For Python version 3 # With external module None # Made by Onno Hoekstra (pa2ohh) import os import time import ftplib from time import gmtime, strftime FTPFILES = "FTPuploads.txt" # ============================================ Mai...
154
30.01
164
17
1,111
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b55fe0b2de9803e3_aa7c5090", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 89 ]
[ null ]
[ 15 ]
[ 45 ]
2024-11-19T02:37:26.222670+00:00
1,579,462,083,000
341c6b5394e1d7c380d6ce6b7eea6722560c67bc
4
{ "blob_id": "341c6b5394e1d7c380d6ce6b7eea6722560c67bc", "branch_name": "refs/heads/master", "committer_date": 1579462083000, "content_id": "28b7c96b632968b593fcff29d4541bdd852ec7c3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "de15fe6741293f04cdf79262110659de2b70a228", "extension": "py"...
4.09375
stackv2
import keyword person = 'happylay' age = 18 gender = '男' # -------------------------------------------------------------------------------- # sep默认分隔符是空格(sep='',end='\n') print(person,age,gender) print(person,age,gender,sep='-') print('hello\nhappylay') print('hello happy',end=' ') print('hello lay',end='\n') # ...
69
17.35
82
8
307
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_49d95e5ee27cdaf9_13564de7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 9, 11, 49 ]
[ null, null, null ]
[ 18, 18, 7 ]
[ 24, 24, 23 ]
2024-11-19T02:37:41.047214+00:00
1,589,232,632,000
171b94032089764406c8fec04fd64150241740fc
3
{ "blob_id": "171b94032089764406c8fec04fd64150241740fc", "branch_name": "refs/heads/master", "committer_date": 1589232632000, "content_id": "3ed7a02c8fb55f77b9c2dfcdda1f620017feb95e", "detected_licenses": [ "MIT" ], "directory_id": "8504c563fc27a4cdfcdf62cf690b86f97b7d59b4", "extension": "py", "fi...
3.265625
stackv2
#! /usr/local/bin/python3 """ Description: This is a module that serves to encrypt strings. Title: crypto.py Author: theStygianArchitect """ import os import sys from argparse import ArgumentParser try: from cryptography.fernet import Fernet except ModuleNotFoundError: print('Please install packaged librarie...
102
26.17
82
14
588
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_398b05e3223bad8a_779f3dd8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 92 ]
[ null ]
[ 19 ]
[ 55 ]
2024-11-19T02:37:51.438998+00:00
1,517,111,770,000
910e29dab1875f338164debd7c1e598d720d3f95
2
{ "blob_id": "910e29dab1875f338164debd7c1e598d720d3f95", "branch_name": "refs/heads/master", "committer_date": 1517111770000, "content_id": "c1285f8b6fcdeb3ebd20d48289044de2ae3e603e", "detected_licenses": [ "MIT" ], "directory_id": "1fecf2925e986038f8aaf2b3cd561fba03bdc964", "extension": "py", "fi...
2.34375
stackv2
from flask import Flask, render_template, request, jsonify from flask_cors import CORS, cross_origin import requests import json from classifier import Classifier from newspaper import Article app = Flask(__name__) CORS(app) @app.route('/') def index(): return render_template('index.html') @app.route("/doreque...
34
25
88
14
207
python
[{"finding_id": "codeql_py/flask-debug_d8a84719c897ada5_1ac64669", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 34, 20 ]
[ null, null ]
[ 5, 16 ]
[ 24, 89 ]
2024-11-19T03:00:05.489213+00:00
1,645,003,624,000
ce135b85894c5e8b986e97fb77ee3023ecaf2d16
2
{ "blob_id": "ce135b85894c5e8b986e97fb77ee3023ecaf2d16", "branch_name": "refs/heads/master", "committer_date": 1645003624000, "content_id": "2adc875882d46c68cd4756782f27b8f7f07c6863", "detected_licenses": [ "MIT" ], "directory_id": "aef4f9c8aa0b2f32436b34f153dcf46ef01064d3", "extension": "py", "fi...
2.40625
stackv2
import re import os import math import time import socket import tarfile import requests import datetime from pathlib import Path from contextlib import closing from lyrebird.log import get_logger from lyrebird.mock.dm.jsonpath import jsonpath logger = get_logger() def convert_size(size_bytes): if size_bytes == 0...
185
28.16
92
17
1,255
python
[{"finding_id": "codeql_py/tarslip_2778c24c4fc62003_1358a57e", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 106 ]
[ null ]
[ 5 ]
[ 7 ]
2024-11-19T03:00:15.961049+00:00
1,528,100,493,000
33c008cf64ad5a058d068177b1321aac6a780dd9
3
{ "blob_id": "33c008cf64ad5a058d068177b1321aac6a780dd9", "branch_name": "refs/heads/master", "committer_date": 1528100493000, "content_id": "ba7d32cee2a67b9c32f06f4eeea95af75e3e54fa", "detected_licenses": [ "MIT" ], "directory_id": "6acc05c17cb15b690eac55e0f2c56bf020f58d45", "extension": "py", "fi...
2.5625
stackv2
import os import sys if sys.version_info[0] < 3: import Queue as queue else: import queue import threading import signal import numpy import pyaudio from quiet.quiet import Decoder class Listener(object): def __init__(self): self.pyaudio_instance = None self.done = None self.thr...
101
24.94
88
15
558
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_20ecea5aef9afbc2_d2165bd4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 78 ]
[ null ]
[ 15 ]
[ 62 ]
2024-11-19T03:00:26.562881+00:00
1,684,958,368,000
7d2cf2b49bf8f37fb3586d3e2e7780026b15d33f
3
{ "blob_id": "7d2cf2b49bf8f37fb3586d3e2e7780026b15d33f", "branch_name": "refs/heads/master", "committer_date": 1684958368000, "content_id": "e0b1ab9494f8c6707c225b24c9609b5a6c1cdd56", "detected_licenses": [ "MIT" ], "directory_id": "eff938b40db326ec121e4dd57c6e64a1767ac654", "extension": "py", "fi...
3.171875
stackv2
from typing import * import logging import math import bing from planedb import * from datetime import datetime, timedelta def deg2rad(deg: float) -> float: """Convert degrees to radians Arguments: deg {float} -- Angle in degrees Returns: float -- Angle in radians """ return deg ...
177
32.16
144
15
1,626
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_2e560640ccbeda13_0c42b68b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [airliners.net](1) may be at an arbitrary position in t...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [airliners.net](1) may be at an arbitrary position in the sanitized URL.", "The string [planefinder.net](1) may be at an arbitrary position in the sanitized URL.", "The string [carsbase.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 109, 111, 113 ]
[ null, null, null ]
[ 8, 8, 8 ]
[ 30, 32, 29 ]
2024-11-19T03:11:41.874385+00:00
1,597,062,598,000
c53c9e25e6d566e5d0429e5b43d0c9c9cdfa14f6
2
{ "blob_id": "c53c9e25e6d566e5d0429e5b43d0c9c9cdfa14f6", "branch_name": "refs/heads/master", "committer_date": 1597062598000, "content_id": "dee07b882c6c71c8056b0a88e4dcc7b59e56f0b3", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7c23594e20c9db087ec1f14a471c332b605f1acd", "extension": "p...
2.390625
stackv2
from __future__ import absolute_import from __future__ import division from __future__ import print_function from collections import defaultdict import gzip import io import os import random import tarfile import nltk import jieba # Dependency imports import requests import six from six.moves import xrange # pylin...
238
34.16
97
19
1,993
python
[{"finding_id": "codeql_py/tarslip_a6b722ddf85c4aa8_cdda25a1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 50 ]
[ null ]
[ 13 ]
[ 23 ]
2024-11-19T03:11:57.597225+00:00
1,553,789,160,000
a9119d28e6fed1a3aae6b037dd3366469555f1f8
3
{ "blob_id": "a9119d28e6fed1a3aae6b037dd3366469555f1f8", "branch_name": "refs/heads/master", "committer_date": 1553789160000, "content_id": "152e75d936f9ab49603ef6f59b2528f64ff74d6c", "detected_licenses": [ "MIT" ], "directory_id": "ddf2ba7036f1f3f5239af8a7f7f32288fcb16a6e", "extension": "py", "fi...
2.734375
stackv2
import os import socket import time import psycopg2 as psycopg2 from flask import Flask app = Flask(__name__) starttime = time.time() @app.route('/') def home(): ########################################################################## # simulate some initial delay until the app is ready to respond ###...
94
33.67
83
17
697
python
[{"finding_id": "codeql_py/stack-trace-exposure_2e3bf4e9c5c89502_223e50a2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 83 ]
[ null ]
[ 12 ]
[ 26 ]
2024-11-19T03:12:01.748699+00:00
1,573,197,979,000
1129027669bffb66602239505da493d40b53464a
3
{ "blob_id": "1129027669bffb66602239505da493d40b53464a", "branch_name": "refs/heads/master", "committer_date": 1573197979000, "content_id": "9ca86201cbcb8f616e38b12dd71784af86eb5fcf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1f2847d635a3806020337b45e9fd75027f9da6d2", "extension": "py"...
2.578125
stackv2
import logging from multiprocessing import Queue, Pipe from flask import Flask, jsonify, request from ..utils.constants import * logger = logging.getLogger(__name__) def start_server(queue: Queue, port: int): logger.debug(f"Create and init server ...") app = Flask(__name__) log = logging.getLogger('...
100
28.56
99
16
633
python
[{"finding_id": "codeql_py/log-injection_aa8e732e1177816d_390b3184", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).\nThis log entry depends o...
[ 26, 51, 65, 79, 94 ]
[ null, null, null, null, null ]
[ 22, 22, 22, 22, 24 ]
[ 99, 75, 80, 74, 86 ]
2024-11-19T03:12:15.413899+00:00
1,550,134,092,000
2d89d3557c5796ab51fc4b1f40a7dda0c87e79bf
2
{ "blob_id": "2d89d3557c5796ab51fc4b1f40a7dda0c87e79bf", "branch_name": "refs/heads/master", "committer_date": 1550134092000, "content_id": "c4da8ace0221ce782e3306038cca64d41e13bc7e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e7393a151d983e97ebcbcba3768ba1654cee18f9", "extension": "py"...
2.453125
stackv2
from flask import Blueprint, request, url_for, redirect import json import logging from pycorenlp import StanfordCoreNLP from core import entity_extraction from relation_extraction.core.parser import RelParser relext = Blueprint("relext_server", __name__, static_folder='static') logger = logging.getLogger(__name__)...
58
32.48
103
12
447
python
[{"finding_id": "codeql_py/log-injection_7d3516edf9ba21ab_f3b9bf69", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 43 ]
[ null ]
[ 18 ]
[ 50 ]
2024-11-19T03:12:20.407692+00:00
1,619,782,176,000
cb7bbbd5ce151eb56e2a70f753e93fc668dbacd9
2
{ "blob_id": "cb7bbbd5ce151eb56e2a70f753e93fc668dbacd9", "branch_name": "refs/heads/master", "committer_date": 1619782176000, "content_id": "e34318eab6196a35962773b25c67cd580465b5f2", "detected_licenses": [ "MIT" ], "directory_id": "9c3bf14350f2bbc8dc79bfb33fd4b8e8a3060aee", "extension": "py", "fi...
2.328125
stackv2
# thanks to @github/ZipFile, https://gist.github.com/ZipFile/c9ebedb224406f4f11845ab700124362 import platform from base64 import urlsafe_b64encode from hashlib import sha256 from secrets import token_urlsafe from urllib.parse import urlencode import requests from requests_toolbelt.adapters import host_header_ssl from...
165
33.67
100
18
1,532
python
[{"finding_id": "codeql_py/request-without-cert-validation_19353975a4533d71_fde8e936", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 160 ]
[ null ]
[ 24 ]
[ 87 ]
2024-11-19T03:12:31.141670+00:00
1,577,163,605,000
262c52e54274da2674be7103ab435f1c9e335412
3
{ "blob_id": "262c52e54274da2674be7103ab435f1c9e335412", "branch_name": "refs/heads/master", "committer_date": 1577163605000, "content_id": "719d3a281e8d6acebba06dc47f15f47f3c5e16e5", "detected_licenses": [ "MIT" ], "directory_id": "af50b5007028a209597f7aefaab560f9ab677cb6", "extension": "py", "fi...
3.203125
stackv2
#!/bin/env python3 import collections import hashlib import pprint def md5(indata): hasher = hashlib.md5() hasher.update(indata.encode('utf-8')) return hasher.hexdigest() class State(collections.namedtuple('State', ('position', 'path'))): __slots__ = () def valid_move(self, direction): ...
88
27.31
71
16
607
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4b39dbc8e19b1d27_e78cb2f0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 10 ]
[ null ]
[ 19 ]
[ 41 ]
2024-11-19T03:12:37.465920+00:00
1,532,590,045,000
713f649c8c68e8111803b2c2fd2c3753ee1a8bb8
3
{ "blob_id": "713f649c8c68e8111803b2c2fd2c3753ee1a8bb8", "branch_name": "refs/heads/master", "committer_date": 1532590045000, "content_id": "89152a6128a5aedaddf83fea1c7eea2ea8b38c4f", "detected_licenses": [ "MIT" ], "directory_id": "9e7ea33153b005eaf25558ed1fbb1a6fb15f5058", "extension": "py", "fi...
2.59375
stackv2
import sys import io import yaml import json from SPARQLWrapper import SPARQLWrapper, JSON def outputPrefixes(): prefixes = [('rdfs', 'http://www.w3.org/2000/01/rdf-schema#'), ('wdt', 'http://www.wikidata.org/prop/direct/'), ('wd','http://www.wikidata.org/entity/')] prefixesForOutput = u'' for prefix in prefixes...
102
27.34
154
17
893
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d8441d5060ac8bde_262d1f2d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text." ]
[ 70, 74 ]
[ null, null ]
[ 22, 22 ]
[ 97, 103 ]
2024-11-19T03:25:31.515245+00:00
1,539,874,178,000
219d81d0ba2d49679496d6e0945d0e1a49162a44
3
{ "blob_id": "219d81d0ba2d49679496d6e0945d0e1a49162a44", "branch_name": "refs/heads/master", "committer_date": 1539874178000, "content_id": "d5323afcedc3915972e0b215144181a49226100a", "detected_licenses": [ "MIT" ], "directory_id": "d456c1c892553066a594c3809005728e01e826da", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python3 from jinja2 import Template import os from pyquery import PyQuery dir_path = os.path.dirname(os.path.realpath(__file__)) def query_html(filename): file_html_src = (open(dir_path + '/' +filename, 'r')).read() dom = PyQuery(file_html_src) title = dom("#title").text() author = dom...
152
24.97
92
16
997
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_54ca5f5b417d93c8_58bb7621", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18, 50, 89 ]
[ null, 85, 132 ]
[ 20, 17, 21 ]
[ 42, 2, 5 ]
2024-11-19T03:25:36.784879+00:00
1,615,570,653,000
d16ec1a7de8ef75eb0362348cfc93850e6860819
2
{ "blob_id": "d16ec1a7de8ef75eb0362348cfc93850e6860819", "branch_name": "refs/heads/master", "committer_date": 1615570653000, "content_id": "6cb22eb9dd9f59c3536515931750642472c6123f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b47c136e077f5100478338280495193a8ab81801", "extension": "py"...
2.359375
stackv2
# SPDX-FileCopyrightText: 2021 ladyada for Adafruit Industries # SPDX-License-Identifier: MIT import time import board import busio from digitalio import DigitalInOut import neopixel from adafruit_esp32spi import adafruit_esp32spi from adafruit_esp32spi import adafruit_esp32spi_wifimanager import adafruit_esp32spi.ada...
116
30.16
88
10
991
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8fb1fc7eb420cec2_a2e8eb78", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 66 ]
[ null ]
[ 11 ]
[ 85 ]
2024-11-19T03:25:38.156934+00:00
1,624,126,379,000
8e135a7eda6998ee93f85081a167bc5e87f5df14
2
{ "blob_id": "8e135a7eda6998ee93f85081a167bc5e87f5df14", "branch_name": "refs/heads/master", "committer_date": 1624126379000, "content_id": "aa9652644356c5783c07fab0828ffd85bc89aa58", "detected_licenses": [ "MIT" ], "directory_id": "b0d1b1ad8d3d1b0668ace7733e61135f967160db", "extension": "py", "fi...
2.4375
stackv2
import ast import copy import logging import os import shutil from abc import ABCMeta from docxtpl import DocxTemplate, R from jinja2 import Environment, meta, Template from wordmarker.contexts import YamlContext, SystemContext from wordmarker.creatives import FactoryBean, AbstractBuilder from wordmarker.loaders impo...
433
24.56
101
23
2,975
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_107fda53c4e96cf0_2b0d2afc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 397, 401 ]
[ null, null ]
[ 15, 16 ]
[ 28, 30 ]
2024-11-19T03:25:41.319596+00:00
1,504,760,137,000
7e12445a03ef1f8e46fac90e6151b2eeea3c2f30
3
{ "blob_id": "7e12445a03ef1f8e46fac90e6151b2eeea3c2f30", "branch_name": "refs/heads/master", "committer_date": 1504760142000, "content_id": "928ceaf2a45efeba5aa6e03eaf09e5f7e8f6c9e2", "detected_licenses": [ "MIT" ], "directory_id": "5ad1731041310177d9f99cc196fbedb4faa43e2e", "extension": "py", "fi...
2.546875
stackv2
# Based on: http://isadoranun.github.io/tsfeat/FeaturesDocumentation.html # JSAnimation import available at https://github.com/jakevdp/JSAnimation import warnings import numpy as np import jinja2 from matplotlib import pyplot as plt from matplotlib import animation from JSAnimation import IPython_display from IP...
124
24.4
80
15
845
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_44bbde292d239a4b_c1db95ea", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 62, 105 ]
[ 81, 120 ]
[ 27, 25 ]
[ 5, 5 ]
2024-11-19T01:28:39.567201+00:00
1,564,555,534,000
03395260769b7d36ce2d110c9415fa5f5f9b9fa6
3
{ "blob_id": "03395260769b7d36ce2d110c9415fa5f5f9b9fa6", "branch_name": "refs/heads/master", "committer_date": 1564555534000, "content_id": "1a3b7d25726d6e705054aed976bafe7242dd445d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9cadeaf9b18b0220eec57dc5cd3d8865e99cbf63", "extension": "p...
2.671875
stackv2
import pydicom from pydicom.filereader import read_dicomdir, read_dataset from pydicom.data import get_testdata_files from pydicom.errors import InvalidDicomError from os.path import dirname, join from pprint import pprint import matplotlib.pyplot as plt from pydicom.dataset import Dataset from pathlib import Path from...
117
46.26
139
19
1,146
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0be9779548f63a6b_f19bf0a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 69, 116 ]
[ 70, 117 ]
[ 23, 27 ]
[ 75, 37 ]
2024-11-19T01:28:43.325443+00:00
1,630,234,877,000
20a4639333c5b1c6b82b88736df35e27b7735349
3
{ "blob_id": "20a4639333c5b1c6b82b88736df35e27b7735349", "branch_name": "refs/heads/main", "committer_date": 1630234877000, "content_id": "1402590f4a81aa6266da6238a6bfc7f23e4a119e", "detected_licenses": [ "MIT" ], "directory_id": "aedd20d15c45e521aca84d187b7ec7d9cf8f5d29", "extension": "py", "file...
2.96875
stackv2
# -*- coding: utf-8 -*- """ Created on Sat Aug 28 23:05:36 2021 @author: Dhanisht """ # class blood_app: def admin(): global address_bb global address_bc global bg_A global bg_B global bg_AB global bg_O global request global contact_detail choice=int(input("enter your choi...
110
27.39
108
12
770
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc5304caa69a5f85_80d32729", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 52, 67 ]
[ null, null ]
[ 31, 31 ]
[ 37, 37 ]
2024-11-19T01:28:57.194533+00:00
1,496,352,487,000
5a2e299278e59f29a9e696cbeefad2406190d2ce
3
{ "blob_id": "5a2e299278e59f29a9e696cbeefad2406190d2ce", "branch_name": "refs/heads/master", "committer_date": 1496352487000, "content_id": "703b2626bd0c4277eed5973ae4b8b6104c18ed5e", "detected_licenses": [ "MIT" ], "directory_id": "eb136cf6ffd457de9dbb494dd7e610a14429eb94", "extension": "py", "fi...
2.71875
stackv2
# Metarunlog, experiment management tool. # Author: Tom Sercu # Date: 2016-10-07 from jinja2 import Template from collections import OrderedDict import itertools import cfg class ConfParser: """ ConfParser class will take a template experiment config file, which ends with MRL:grid[] or MRL:params instruct...
49
44.53
105
15
513
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_11c970a1865c7ed9_94314547", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 22 ]
[ 54 ]
2024-11-19T01:28:58.694199+00:00
1,503,778,474,000
fea8e6c1c3075378a481ae3272a74f4497d16501
2
{ "blob_id": "fea8e6c1c3075378a481ae3272a74f4497d16501", "branch_name": "refs/heads/master", "committer_date": 1503778474000, "content_id": "5eed5602ba8f8729ff3fc6068a8add668635fd5e", "detected_licenses": [ "MIT" ], "directory_id": "f7bd89568154724af56dd6e3d1f09511c4b7778f", "extension": "py", "fi...
2.40625
stackv2
import glob import os import itertools import urllib.request as url_request import tarfile import json import pickle import numpy as np import pandas as pd from sklearn.utils import check_random_state from mosaic import image_io from mosaic.datasets.base import get_data_home, ImageDataBundle from mosaic.datasets.prog...
74
30.22
70
15
620
python
[{"finding_id": "codeql_py/tarslip_9a367a6a94fbbe4b_57c86588", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 37 ]
[ null ]
[ 5 ]
[ 39 ]
2024-11-19T01:29:01.733538+00:00
1,634,475,250,000
df870a8f189be10b1175e7f379ad576a805270c5
2
{ "blob_id": "df870a8f189be10b1175e7f379ad576a805270c5", "branch_name": "refs/heads/master", "committer_date": 1634475250000, "content_id": "b0aab44d0bcc28a200375cc7f985ddd692fd8046", "detected_licenses": [ "MIT" ], "directory_id": "0c239c57268cf4e08f50a347a1f63d135999967f", "extension": "py", "fi...
2.375
stackv2
import os if os.getenv('DEVELOPMENT') is not None: from dotenv import load_dotenv load_dotenv(dotenv_path='../.env') import sys from flask import Flask, request, abort from linebot import ( LineBotApi, WebhookHandler ) from linebot.exceptions import ( InvalidSignatureError ) from linebot.models impo...
72
25.17
84
14
434
python
[{"finding_id": "codeql_py/flask-debug_b2492305b3ffbe88_b5e44043", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-117" ]
[ "py/flask-debug", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1)." ]
[ 72, 45 ]
[ null, null ]
[ 5, 21 ]
[ 51, 44 ]
2024-11-19T01:29:06.670426+00:00
1,619,196,671,000
842a0b72efb019ccb839fafd4c00a1267b8836dd
4
{ "blob_id": "842a0b72efb019ccb839fafd4c00a1267b8836dd", "branch_name": "refs/heads/main", "committer_date": 1619196671000, "content_id": "2d04a6993d7abf27f0413a3f35b84b0449805df5", "detected_licenses": [ "Unlicense" ], "directory_id": "7f4e6bfa2febda8edd6ebcff329ccef2b243991e", "extension": "py", ...
4.09375
stackv2
import sys import csv import os CLIENT_TABLE = '.clients.csv' CLIENT_SCHEMA = ['first_name', 'last_name', 'email', 'phone_number'] clients = [] def _initialize_clients_from_storage(): # Opening .clients.csv file in reading mode and copying its actual # content to clients list variable. with open(CLIENT_TA...
153
27.88
119
15
1,007
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_37be8fa84d8d7178_58265ec3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 44 ]
[ null ]
[ 15 ]
[ 119 ]
2024-11-19T01:29:28.107701+00:00
1,639,211,459,000
7105aa20a41d4f4ed41872a8e5940001f51cd28c
3
{ "blob_id": "7105aa20a41d4f4ed41872a8e5940001f51cd28c", "branch_name": "refs/heads/master", "committer_date": 1639211459000, "content_id": "d268ecabc92033272330fd1384c76375e864c296", "detected_licenses": [ "MIT" ], "directory_id": "134709679f95aed16ad59fd6612f83ef8d8f2723", "extension": "py", "fi...
2.703125
stackv2
import math from io import StringIO from typing import List from urllib.parse import unquote import uuid from daft import Node, PGM from flask import Flask, request, Response, send_from_directory app = Flask(__name__) @app.route('/static/<path:path>') def static_file(path): return send_from_directory('static',...
138
29.47
82
19
855
python
[{"finding_id": "codeql_py/code-injection_eb2a72f8d90c6e58_0439bd3d", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 44 ]
[ null ]
[ 10 ]
[ 22 ]
2024-11-19T01:29:28.906782+00:00
1,610,687,112,000
a67e7c46a8e6a1c20dc298f739c2fca3e9dc06b8
3
{ "blob_id": "a67e7c46a8e6a1c20dc298f739c2fca3e9dc06b8", "branch_name": "refs/heads/master", "committer_date": 1610687112000, "content_id": "9f206bb9ac7fca4b05b8eca595b070bf1b1dd444", "detected_licenses": [ "MIT" ], "directory_id": "af87c1e2ef3161eedb61e680969544dba8afa039", "extension": "py", "fi...
2.671875
stackv2
# Import Requests library import requests # NSX Variables nsxmanager = 'https://nsxmgr-01a.corp.local' nsxurl = '/api/2.0/services/usermgmt/user/admin' nsxheaders = {'Content-Type': 'application/xml'} nsxuser = 'admin' nsxpass = 'VMware1!' # REST API call using requests.get function from request library. Set verify t...
18
29
109
8
150
python
[{"finding_id": "codeql_py/request-without-cert-validation_290dbe732f2a2cdf_03cf819e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 12 ]
[ null ]
[ 12 ]
[ 110 ]
2024-11-19T01:29:51.079172+00:00
1,426,216,256,000
4c6ffd404f855a8c4b8b6a39ff6d138024974a01
3
{ "blob_id": "4c6ffd404f855a8c4b8b6a39ff6d138024974a01", "branch_name": "refs/heads/master", "committer_date": 1426216256000, "content_id": "79624f272794d6995131b81a9c1a08624e89a57d", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "625a3c166e258af9ac3081c4501238039ee2b72c", "ext...
2.59375
stackv2
import logging import psycopg2 import psycopg2.extensions from .packages import pgspecial _logger = logging.getLogger(__name__) # Cast all database input to unicode automatically. # See http://initd.org/psycopg/docs/usage.html#unicode-handling for more info. psycopg2.extensions.register_type(psycopg2.extensions.UNICO...
145
37.36
79
15
1,255
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a8fde26b785c3d4b_45aedf07", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive dat...
[ 44, 44, 44, 44, 44 ]
[ null, null, null, null, null ]
[ 13, 21, 27, 37, 43 ]
[ 19, 25, 35, 41, 47 ]
2024-11-19T01:30:05.728489+00:00
1,686,792,379,000
c6fbfa509124d35dd45d011aa771ab70352e56ff
2
{ "blob_id": "c6fbfa509124d35dd45d011aa771ab70352e56ff", "branch_name": "refs/heads/main", "committer_date": 1686792379000, "content_id": "2e6df78b859b090b1960b3579efa8d8da88c4d9f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "aa5a8163c450a7ca7f4d3e7483213bb3642e0824", "extension": "py", ...
2.375
stackv2
import json import random import string import requests import time import base64 from flask import Flask, request from pymessenger.bot import Bot with open('keys.json', 'r') as file: ACCESS_TOKEN = json.loads(file.read())['facebook']['token'] VERIFY_TOKEN = 'alexpoloz' with open('sets.json', 'r') as file: sets ...
202
22.48
146
21
1,363
python
[{"finding_id": "codeql_py/full-ssrf_fac1750876309e1b_b0c31ad0", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-079" ]
[ "py/full-ssrf", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 128, 149 ]
[ null, null ]
[ 81, 10 ]
[ 99, 37 ]
2024-11-19T01:55:10.756555+00:00
1,600,453,713,000
29ac37e330c1b3a7b07bf1d61b3f9dbec99a34a9
3
{ "blob_id": "29ac37e330c1b3a7b07bf1d61b3f9dbec99a34a9", "branch_name": "refs/heads/master", "committer_date": 1600453713000, "content_id": "af1961b60f87c23608bfe26571409c9ee50d3e8d", "detected_licenses": [ "MIT" ], "directory_id": "12204664d0de6e89a62f4c5f78a3ad3cbe2da09a", "extension": "py", "fi...
2.546875
stackv2
import decimal import hashlib import logging import re import uuid from collections import OrderedDict from dataclasses import dataclass from math import inf from typing import Any, Dict, List, Optional import pandas as pd from django.conf import settings from django.core.cache import cache from django.core.serializer...
248
29.25
97
19
1,737
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5cfd7546ccf7e141_277283cf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 98 ]
[ null ]
[ 22 ]
[ 50 ]
2024-11-19T02:06:41.415634+00:00
1,616,044,516,000
be2883b079af6f6d092e3978863561f815bd0c0a
3
{ "blob_id": "be2883b079af6f6d092e3978863561f815bd0c0a", "branch_name": "refs/heads/master", "committer_date": 1616044516000, "content_id": "c2456bd51ee88c85ed7dc3ffc1dc4dbd500010c9", "detected_licenses": [ "MIT" ], "directory_id": "e8294bb01d47a59745065bf50ca718d1321c7184", "extension": "py", "fi...
2.765625
stackv2
# -*- coding: utf-8 -*- import base64 from Crypto import Random from Crypto.Cipher import AES from Crypto.Hash import SHA256 from acclist.lib.exception.acccryptoexception import AcccryptoDecryptException class AccCrypto(object): def __init__(self): # must be ascii str self.checkstr = 'accup_crypt...
121
32.79
109
18
1,059
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_e5da039429ae927d_67e2f916", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 86, 99, 101 ]
[ null, null, null ]
[ 19, 22, 34 ]
[ 41, 44, 56 ]
2024-11-19T02:07:03.218272+00:00
1,561,025,009,000
594ed1a2a0e7488f11b1e47fde3614d24724ad0b
2
{ "blob_id": "594ed1a2a0e7488f11b1e47fde3614d24724ad0b", "branch_name": "refs/heads/master", "committer_date": 1561025009000, "content_id": "f48cd341b022ddcdbcad42e1da0ed316a1cdee11", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c5a8edd9834e042933b7ef132640deec55ada18c", "extension": "py"...
2.40625
stackv2
#!/usr/bin/env python import webapp2 import urllib2 import urllib import re from google.appengine.ext import ndb from models import TestNote from models import Note import datetime import os import jinja2 import logging url = 'https://www.zlobki.waw.pl/rekrutacja2012/index.php' pesel = '00000000000' pin = '0000' imi...
256
40
117
15
2,728
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d474d67790d86e81_5843d28d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 28 ]
[ null ]
[ 13 ]
[ 90 ]
2024-11-19T02:07:04.293446+00:00
1,532,358,598,000
d762e284ddcae1960615756c778537745a68b808
3
{ "blob_id": "d762e284ddcae1960615756c778537745a68b808", "branch_name": "refs/heads/master", "committer_date": 1532358598000, "content_id": "aab9ebd3bb28c5dd0328e5bdefc5e8679aac2beb", "detected_licenses": [ "MIT" ], "directory_id": "93f0e62fc16624e0e33891a1076fa5f40a6ef9d3", "extension": "py", "fi...
2.671875
stackv2
# coding: utf-8 from flask import Flask, render_template, send_from_directory from os.path import isdir, isfile from os import listdir from tools import Tool from fuzzywuzzy import process app = Flask(__name__) tool = Tool() # Initilize search engine fuzzy_choices = [] fuzzy_choices_lower = [] ko = 0 match_search = t...
135
28.08
79
19
888
python
[{"finding_id": "codeql_py/path-injection_951d86f49beb4a3d_5e050f07", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
7
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](...
[ 84, 85, 98, 105, 108, 110, 130 ]
[ null, null, null, null, null, null, null ]
[ 14, 29, 14, 29, 26, 29, 15 ]
[ 27, 42, 27, 42, 35, 38, 28 ]
2024-11-19T02:31:48.568046+00:00
1,549,534,680,000
77eba4e9b03ecad193a03eb95644e81a77f77448
3
{ "blob_id": "77eba4e9b03ecad193a03eb95644e81a77f77448", "branch_name": "refs/heads/master", "committer_date": 1549534680000, "content_id": "41e382dd028cba061228b60bd08c30506e2f60eb", "detected_licenses": [ "MIT" ], "directory_id": "c82fcc7ed3b9f1f1e5deedbbc58d47aafec0865a", "extension": "py", "fi...
2.625
stackv2
import os import datetime import logging from jinja2 import Template logger = logging.getLogger("CyberCaptain") def run_path_visualisation(paths, config, modulesConfig): """ Runs the path visualization. Assembles the paths to be visualized. Will call the render function to output a HTML. **Parameter...
78
38.76
159
20
642
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e7f17102e67ba941_168243d5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 70 ]
[ null ]
[ 20 ]
[ 42 ]
2024-11-19T02:31:59.598259+00:00
1,563,717,647,000
46b347e60ad44ed5b6de66c6994ac864875d2312
3
{ "blob_id": "46b347e60ad44ed5b6de66c6994ac864875d2312", "branch_name": "refs/heads/master", "committer_date": 1563717647000, "content_id": "795183de6a0768f33ed394993f4c7d6e431e56a8", "detected_licenses": [ "MIT" ], "directory_id": "c3415b113a09199bcc0b771013160801cf874447", "extension": "py", "fi...
3.40625
stackv2
# #!/usr/bin/env python3 # """Password generator using Python 3.6 features.""" # # import secrets import random import string import sys # class Gen: # def __init__('pwd') # def generate_password(self): # """ # a method that gnerates pasword using choice and random key words # ...
46
22.39
78
14
250
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2236903abf9bd3c1_c2e78c5a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 42 ]
[ null ]
[ 11 ]
[ 27 ]
2024-11-19T02:32:05.404170+00:00
1,466,900,467,000
94cc908e9610fbf614fb95c3b3904ee7c236b5c2
2
{ "blob_id": "94cc908e9610fbf614fb95c3b3904ee7c236b5c2", "branch_name": "refs/heads/master", "committer_date": 1466900467000, "content_id": "e5460f970d4122a6ebd4de20118fe49b22a99907", "detected_licenses": [ "MIT" ], "directory_id": "d20f9d253ee13bf9e6cf87e5eb0f8966e3059a21", "extension": "py", "fi...
2.328125
stackv2
from flask import render_template, current_app, request, redirect, url_for, \ flash, session from flask import jsonify from flask_login import login_user, logout_user, login_required, current_user from . import auth from forms import LoginForm import jsonpickle import bcrypt from app import mongo from app.models...
84
33.6
108
16
620
python
[{"finding_id": "codeql_py/unsafe-deserialization_f88aa624f736812c_d2abc092", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
2
true
[ "CWE-502", "CWE-601" ]
[ "py/unsafe-deserialization", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 77, 47 ]
[ null, null ]
[ 35, 29 ]
[ 47, 84 ]
2024-11-19T02:32:09.468775+00:00
1,629,378,150,000
a1b290cb03838ab81ed17d1539c8abd81c90d365
3
{ "blob_id": "a1b290cb03838ab81ed17d1539c8abd81c90d365", "branch_name": "refs/heads/master", "committer_date": 1629378727000, "content_id": "5411e49ab239d1fed66cddef236ff2e74850cb88", "detected_licenses": [ "MIT" ], "directory_id": "5de836cf809ea7088a6c2ae66c4d4c5db2913ca8", "extension": "py", "fi...
3.34375
stackv2
# -*- coding: utf-8 -*- """ This module checks for password pwnage using k-anonimity. """ import sys import requests from requests.compat import urljoin import passpwnedcheck.constants as constants from passpwnedcheck.utils import get_password_prefix_suffix, response_to_dict class PassChecker: ''' Receive...
96
25.83
86
14
549
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5671e50c75d141d5_59f6ea5c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 77, 80 ]
[ null, null ]
[ 19, 19 ]
[ 67, 57 ]
2024-11-19T02:32:10.617351+00:00
1,563,842,559,000
13f8d8b88d35e639ffedcb04dec2b34fb2a966c7
2
{ "blob_id": "13f8d8b88d35e639ffedcb04dec2b34fb2a966c7", "branch_name": "refs/heads/master", "committer_date": 1563842559000, "content_id": "9fef78c02ab986e8b3afac4695c6617bd9d96829", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ae03e3eece1f4184e8ef8d009ceb25bdcc2557b5", "extension": "p...
2.375
stackv2
#!/usr/bin/env python # # Copyright 2018, Data61 # Commonwealth Scientific and Industrial Research Organisation (CSIRO) # ABN 41 687 119 230. # # This software may be distributed and modified according to the terms of # the BSD 2-Clause license. Note that NO WARRANTY is provided. # See "LICENSE_BSD2.txt" for details. #...
154
34.32
106
18
1,249
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e25886962156abe0_46cfdcce", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 126 ]
[ 132 ]
[ 11 ]
[ 42 ]
2024-11-19T02:32:23.298716+00:00
1,692,085,350,000
8a8d47ea903ce506dbd3f67f0e5fd1f29db35003
2
{ "blob_id": "8a8d47ea903ce506dbd3f67f0e5fd1f29db35003", "branch_name": "refs/heads/master", "committer_date": 1692085350000, "content_id": "345449901f4bb6e6618e59bbc2a38ce2532f8b64", "detected_licenses": [ "MIT" ], "directory_id": "cbf1b4f810cd237bde51388f3bf1bbf60eee371d", "extension": "py", "fi...
2.34375
stackv2
from contextlib import contextmanager import os import re import click from jinja2 import Environment, FileSystemLoader, Template from . import echo SUFFIX = '.jinja2' def regex_replace(s, find, replace): """A non-optimal implementation of a regex filter""" return re.sub(find, replace, s) @contextmanager...
80
25.16
71
19
505
python
[{"finding_id": "codeql_py/overly-permissive-file_42bc9936afe67e4f_e11b0f9d", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
4
true
[ "CWE-732", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/overly-permissive-file", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks....
[ 68, 34, 46, 50 ]
[ null, null, null, null ]
[ 9, 18, 22, 24 ]
[ 28, 64, 34, 36 ]
2024-11-19T02:32:58.959603+00:00
1,605,268,514,000
27269b3110a600281e07cc5e4555be5228c9af3a
3
{ "blob_id": "27269b3110a600281e07cc5e4555be5228c9af3a", "branch_name": "refs/heads/master", "committer_date": 1605268514000, "content_id": "f312f6e31044a5d34d43caeb1f9728a71d7e0c9a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9340b4532bbc98f456da58b36d6bbecd925be12f", "extension": "py"...
3.453125
stackv2
import re import struct from typing import Iterable, List, Text, Tuple, Union import unicodedata import six def wtq_normalize(x): """Returns the normalized version of x. This normalization function is taken from WikiTableQuestions github, hence the wtq prefix. For more information, see https://github.com/ppas...
126
28.44
81
14
1,019
python
[{"finding_id": "codeql_py/redos_1e1e51131f08ac73_25a4137b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\[0\\]'.", "rem...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\[0\\]'." ]
[ 31 ]
[ null ]
[ 18 ]
[ 55 ]
2024-11-19T02:43:32.406573+00:00
1,580,874,826,000
34e77333867ec7caf497188273ed6b66043a64d8
3
{ "blob_id": "34e77333867ec7caf497188273ed6b66043a64d8", "branch_name": "refs/heads/master", "committer_date": 1580874826000, "content_id": "bf4b830b86d5fb6c0fa1fc25a9bb884be895831a", "detected_licenses": [ "MIT" ], "directory_id": "63daa6f9811637ef00a9c79fd068e3e9674d6eaa", "extension": "py", "fi...
2.6875
stackv2
from flask import Flask, request, Response, send_from_directory import os import random from os import path from flask_cors import CORS from wand.image import Image import fontforge import psMat import sys from collections import deque CAP_CHARS = set('ABCDEFGHIJKLMNOPQRSTUVWXYZ') DOWN_CHARS = set('gjpqy') UP_CHARS = ...
119
27.51
107
17
984
python
[{"finding_id": "codeql_py/reflective-xss_ac8700f5c3727c0f_d5d71ca2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 84, 119 ]
[ null, null ]
[ 12, 32 ]
[ 24, 37 ]
2024-11-19T02:54:56.239778+00:00
1,621,604,528,000
accebc1166fcadac18673f60d437ea34288cbfda
3
{ "blob_id": "accebc1166fcadac18673f60d437ea34288cbfda", "branch_name": "refs/heads/master", "committer_date": 1621604528000, "content_id": "68c5de2eccad2680c59376548688761b3df370d6", "detected_licenses": [ "MIT" ], "directory_id": "5b2a601d9d47dbc195c9ed9971f9f57755f444c9", "extension": "py", "fi...
2.609375
stackv2
import os import socket import requests import stdiomask import time import json from signal import signal, SIGINT from sys import exit import werkzeug werkzeug.cached_property = werkzeug.utils.cached_property from robobrowser import RoboBrowser ######################### Some global constants ########################...
210
35.2
121
17
1,815
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea15cbe7a3eeefb7_6ac7d20d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 43 ]
[ null ]
[ 11 ]
[ 34 ]
2024-11-19T02:55:02.545896+00:00
1,547,941,159,000
edd9cd6d60e589e919f60e06da3411c9480614f4
3
{ "blob_id": "edd9cd6d60e589e919f60e06da3411c9480614f4", "branch_name": "refs/heads/master", "committer_date": 1547941159000, "content_id": "88445a4aaad8e93b4b38636e0f47fe774133c061", "detected_licenses": [ "MIT" ], "directory_id": "e61d7da79904c6517eac90205bd5bfd7c825a12d", "extension": "py", "fi...
2.515625
stackv2
import smartcar from flask import Flask, redirect, request, jsonify, render_template from flask_cors import CORS import os app = Flask(__name__) CORS(app) # global variable to save our access_token access = None client = smartcar.AuthClient( client_id= '7126d3ad-f1bf-4712-b484-2e450efa1d5f', client_secret='...
77
25.23
122
12
520
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08c9d3ca47cb52fb_01807b73", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 55 ]
[ null ]
[ 11 ]
[ 39 ]
2024-11-19T02:55:06.122996+00:00
1,512,418,778,000
0f8a30a1e1eccb13623a8bf5b91ab7983a229bbd
3
{ "blob_id": "0f8a30a1e1eccb13623a8bf5b91ab7983a229bbd", "branch_name": "refs/heads/master", "committer_date": 1512418778000, "content_id": "deee17966fd7b79fce10aa2e9ac21afba0db1f1d", "detected_licenses": [ "MIT" ], "directory_id": "3668008abf521db354fec89b1c6dded28c783c37", "extension": "py", "fi...
2.59375
stackv2
import click import requests import configparser import json import flask import hmac import os from flask import request from .cli import cli def config_repos_to_list(config): """Parse the repositories contained in configuration file and create a HTML list of them. (for the web usage) :param config: Configu...
373
28.58
124
21
2,385
python
[{"finding_id": "codeql_py/partial-ssrf_6a4d3d87c9924cc6_3f53b64e", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 147, 163 ]
[ null, null ]
[ 5, 5 ]
[ 24, 43 ]
2024-11-19T02:55:16.025057+00:00
1,599,948,775,000
7a6ce2bd35f97cf64420d26baed15ba6fd8fcb9b
3
{ "blob_id": "7a6ce2bd35f97cf64420d26baed15ba6fd8fcb9b", "branch_name": "refs/heads/master", "committer_date": 1599948775000, "content_id": "71ae6987999403ab5d429061e5adcd2b6598a2e1", "detected_licenses": [ "MIT" ], "directory_id": "a34551532207ae46e9d202825e8fc9809709df45", "extension": "py", "fi...
2.703125
stackv2
''' Requires a created twitter_keys.py file in the root for necessary imported variables like keys. [twitter_keys.py] should look like: CONSUMER_KEY = 'xxxxxxxxxxxxxxxxxxx' CONSUMER_KEY_SECRET = 'yyyyyyyyyyyyyyyyyyy' .. and so forth -----------------------------------------------------------------...
75
29.55
98
14
523
python
[{"finding_id": "codeql_py/stack-trace-exposure_476bf2beeb4688d0_e89bc032", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-215", "CWE-601" ]
[ "py/stack-trace-exposure", "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 70, 75, 50 ]
[ null, null, null ]
[ 12, 3, 23 ]
[ 26, 22, 34 ]
2024-11-19T02:55:38.795944+00:00
1,584,226,948,000
de079a865f928c23209188f07f0556a4d41c2ba9
3
{ "blob_id": "de079a865f928c23209188f07f0556a4d41c2ba9", "branch_name": "refs/heads/master", "committer_date": 1584226948000, "content_id": "2bf76fc764692d0c996d080767160a6490c2f715", "detected_licenses": [ "MIT" ], "directory_id": "1a677fe0a84c7aa4ac241fcf1adab6df6de6b66a", "extension": "py", "fi...
2.9375
stackv2
import dns.resolver import re import calendar import time import requests def dns_message_data(message): secs = calendar.timegm(time.gmtime()) return 'shm:' + str(secs) + ':' + message # Valid host names pass simple domain name validation def is_valid_hostname(hostname): if len(hostname) < 4 or len(hos...
107
31.12
128
16
829
python
[{"finding_id": "codeql_py/request-without-cert-validation_07589823db4ef7d4_a5c8ff91", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 59, 82 ]
[ null, null ]
[ 13, 9 ]
[ 44, 40 ]
2024-11-19T02:55:55.502506+00:00
1,534,449,376,000
318d195c86231be911f810c0d2e12899a1481556
2
{ "blob_id": "318d195c86231be911f810c0d2e12899a1481556", "branch_name": "refs/heads/master", "committer_date": 1534449376000, "content_id": "16a3dccfb91db691e5b1db86b5c1e45c0dc33d10", "detected_licenses": [ "MIT" ], "directory_id": "873abb51a2f7f5b54dbff852181b17d792c4d2f4", "extension": "py", "fi...
2.453125
stackv2
import base64 import os import re from enum import Enum from pathlib import Path from isort import SortImports from jinja2 import Template, TemplateError from ..exceptions import AiohttpDevConfigError from ..logs import main_logger as logger THIS_DIR = Path(__file__).parent TEMPLATE_DIR = THIS_DIR / 'template' # ty...
182
34.55
108
17
1,510
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5ce01cb331c7d8cc_03955b83", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 154 ]
[ null ]
[ 24 ]
[ 47 ]
2024-11-19T02:55:58.223694+00:00
1,549,333,824,000
e4b6ebb172579c58e1dc7918884e9fb9b5ef4d35
3
{ "blob_id": "e4b6ebb172579c58e1dc7918884e9fb9b5ef4d35", "branch_name": "refs/heads/master", "committer_date": 1549333824000, "content_id": "205d9ec53c1d974678f1cc28d685590d5e3bd089", "detected_licenses": [ "MIT" ], "directory_id": "fd29efb6e4c087c17350502fd36a0f5022a5a190", "extension": "py", "fi...
2.765625
stackv2
import os from flask import Flask, request, send_from_directory, flash, redirect, url_for from utils import allowed_file, generate_filename from db import get_db, query_db, close_db app = Flask(__name__) app.config.from_object("config") @app.route('/') def hello_world(): return 'Wave Watch' @app.route('/db/i...
75
26.31
121
17
450
python
[{"finding_id": "codeql_py/url-redirection_506f3dc5f25b9be9_6b15cbfd", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 39, 45 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-19T02:56:02.256925+00:00
1,575,390,245,000
a22e8c22d7d6ad1b3d229948c7ee1db4b48d9058
2
{ "blob_id": "a22e8c22d7d6ad1b3d229948c7ee1db4b48d9058", "branch_name": "refs/heads/master", "committer_date": 1575390245000, "content_id": "f0a2e04ee308b2955f55e5ffb6a94072b402f49b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "b6d52eb0d81647f1b102c1b4100a4e4d0b0ba544", "extension": "p...
2.4375
stackv2
from __future__ import absolute_import import json import logging import re from scrapy.utils.misc import load_object from six import string_types from six.moves.urllib.parse import urlparse from six.moves.urllib.request import urlopen logger = logging.getLogger(__name__) URL_REGEX = re.compile( r"^(?:http|ftp)...
80
26.74
101
20
678
python
[{"finding_id": "codeql_py/redos_2ba9793cfbed4c12_5843c0c1", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'." ]
[ 28 ]
[ null ]
[ 10 ]
[ 84 ]
2024-11-19T02:56:08.115463+00:00
1,556,971,397,000
237ff9a91f7b31856bb02d71f20c12aa43da771f
2
{ "blob_id": "237ff9a91f7b31856bb02d71f20c12aa43da771f", "branch_name": "refs/heads/master", "committer_date": 1556971397000, "content_id": "5dd6075afa4f073ef3caf2250245219467d7f26a", "detected_licenses": [ "MIT" ], "directory_id": "727a4e19617cb922852ed55319a67fccac47e94c", "extension": "py", "fi...
2.390625
stackv2
from interact import Bot from PIL import Image import base64 import pytesseract import io from ocr_mapper import mapper import paramiko import time import threading BASE_URL = 'http://ahl.threatsims.com:5000' VPS_URL = BASE_URL + '/vps/' bot = Bot() def get_new_image(soup): image_data = base64.b64decode(soup.fin...
108
22.46
106
18
680
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e797a8961f46d8c4_c32786cf", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-312" ]
[ "py/paramiko-missing-host-key-validation", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 63, 61 ]
[ null, null ]
[ null, 7 ]
[ 61, 69 ]
2024-11-19T03:10:50.350384+00:00
1,399,473,093,000
852d030ddc45c0ba4b523cb83813be0647ef9d40
2
{ "blob_id": "852d030ddc45c0ba4b523cb83813be0647ef9d40", "branch_name": "refs/heads/master", "committer_date": 1399473093000, "content_id": "683a34cde506b7c33621de30d406af5dc53d424a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5168eec901b0e716853563e5a2fb7f4321676ae5", "extension": "py"...
2.375
stackv2
""" This file implements the debug socket interface available in pegasus-monitord. """ ## # Copyright 2007-2011 University Of Southern California # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the Lic...
257
27.33
100
18
1,774
python
[{"finding_id": "codeql_py/overly-large-range_c822f06ce828a85a_6c3dfa40", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 41 ]
[ null ]
[ 40 ]
[ 43 ]
2024-11-19T03:10:52.263602+00:00
1,585,496,273,000
1ec77b8940d68daac1806a0f11701fc0f67eaf44
3
{ "blob_id": "1ec77b8940d68daac1806a0f11701fc0f67eaf44", "branch_name": "refs/heads/master", "committer_date": 1585496273000, "content_id": "42c2b5939f158587fddd0e9d55d1b14b84a728c8", "detected_licenses": [ "MIT" ], "directory_id": "df992a79bfa12c2c83772d0a6b4b2cbb94b6c86b", "extension": "py", "fi...
3.359375
stackv2
# -------------- #Header files import pandas as pd import numpy as np import matplotlib.pyplot as plt #path of the data file- path data=pd.read_csv(path) data['Gender'].replace('-','Agender',inplace=True) data['Gender'] gender_count=data['Gender'].value_counts() print(gender_count) gender_count.plot.barh() #data.plot...
70
21.54
69
9
440
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_60faf670ec9d8ce5_e2ba9968", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 13 ]
[ null ]
[ 7 ]
[ 19 ]
2024-11-19T03:22:12.329450+00:00
1,497,918,331,000
61f5594438e8be5db75014bf13761cdd52d9f785
3
{ "blob_id": "61f5594438e8be5db75014bf13761cdd52d9f785", "branch_name": "refs/heads/master", "committer_date": 1497918331000, "content_id": "99f578ae5510657357a77e6a96446bac129e7eaf", "detected_licenses": [ "MIT" ], "directory_id": "421b5280f17274244e2db46d5cec1b9a944df0fa", "extension": "py", "fi...
3.234375
stackv2
""" Get bitcoin prices This module buffers the bitcoin data and writes in bursts so it doesn't keep the file open indefinitely, allowing for sync via dropbox/iCloud/etc. """ import json import ssl import csv import time from collections import deque import urllib.request BITCOIN_DATA_QUEUE = deque() STATS = {'count':...
64
30.8
89
14
467
python
[{"finding_id": "codeql_py/insecure-protocol_2e0aeba6d88b481b_e9587259", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)." ]
[ 21 ]
[ null ]
[ 24 ]
[ 58 ]
2024-11-19T03:22:19.398386+00:00
1,634,551,785,000
beea0c73cd0cc7ec0bca40ffc995ccec5ccac2d9
3
{ "blob_id": "beea0c73cd0cc7ec0bca40ffc995ccec5ccac2d9", "branch_name": "refs/heads/master", "committer_date": 1634551785000, "content_id": "64e5a8a584af2298b8f8dc4229a88abcddd637f8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "886e8a9c415f795433f72fba9c98de9d62aa0083", "extension": "py"...
3.125
stackv2
import json import re from collections import namedtuple from hashlib import md5 from pathlib import Path from typing import List, Optional from Levenshtein import ratio from yaml import safe_load Secret = namedtuple("Secret", ["file", "line", "key", "value", "message", "severity"]) escaped_chars = str.maketrans({"...
167
24.24
89
28
1,032
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7d0e081771ebc734_6906f5f4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 132 ]
[ null ]
[ 16 ]
[ 38 ]
2024-11-19T03:22:20.158142+00:00
1,610,866,014,000
666ee5813f0112bbf60c4ddaaa9f4a13cf2582eb
2
{ "blob_id": "666ee5813f0112bbf60c4ddaaa9f4a13cf2582eb", "branch_name": "refs/heads/main", "committer_date": 1610866014000, "content_id": "69d8a948d20f563791d858cf24fd9c02f4718042", "detected_licenses": [ "Apache-2.0" ], "directory_id": "167171716480f71bb0cb460ec420f6374ed115dd", "extension": "py", ...
2.453125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # @author : yasin # @time : 20-12-28 下午9:23 # @File : account.py import tornado.ioloop import tornado.web import tornado.httpclient import tornado.httputil import tornado.gen import hashlib import json import copy import config from config import logger class MainHa...
168
33.14
96
20
1,321
python
[{"finding_id": "codeql_py/reflective-xss_eb05d68dab75dbbe_6de763c5", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 47 ]
[ null ]
[ 32 ]
[ 39 ]
2024-11-19T03:43:51.547254+00:00
1,452,470,541,000
2c6736176a92f9800bd9d0961d5d5fd4fc4b14b4
3
{ "blob_id": "2c6736176a92f9800bd9d0961d5d5fd4fc4b14b4", "branch_name": "refs/heads/master", "committer_date": 1452470541000, "content_id": "57da9c8e4cc099c7560fe8c7bf2bd21adfbc3b64", "detected_licenses": [ "MIT" ], "directory_id": "8946ab804674e32ce86bcabcdf15279ba053c699", "extension": "py", "fi...
3.453125
stackv2
# Calculates the mean and median salaries for each school based on BPShighschool.csv # and writes to salaries.json import csv, json hs = set(['Another Course to College','Boston Arts Academy','Community Academy','Boston International HS', 'Boston Latin School', 'Brighton High', 'Burke High', 'Charlestown High', ...
56
34.86
107
17
553
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_238f8824f28012f0_ec32b1b6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 55 ]
[ null ]
[ 9 ]
[ 32 ]
2024-11-19T03:43:53.321990+00:00
1,573,300,840,000
ec8eb4c046b4087e696937193499e556f721959a
2
{ "blob_id": "ec8eb4c046b4087e696937193499e556f721959a", "branch_name": "refs/heads/master", "committer_date": 1573300840000, "content_id": "f50e1a86cb61c4179a80cae48290fa96fd6db6c4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "081713d72f1c19f9a519fb15089e17164658006e", "extension": "py"...
2.5
stackv2
import json import requests from base64 import b64encode import hashlib import socket import shutil import os import binascii import logging logger = logging.getLogger('urbackup-server-python-api-wrapper') """Backwards compatible imports""" try: import urllib except ImportError: import urllib.parse class u...
470
25.76
110
28
2,711
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1fd293e1bf0dc87b_767dd9cb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 137 ]
[ null ]
[ 52 ]
[ 97 ]
2024-11-19T03:44:00.921054+00:00
1,544,635,865,000
39b3a017a6374775e23ee525568b06a3a75b7e8e
3
{ "blob_id": "39b3a017a6374775e23ee525568b06a3a75b7e8e", "branch_name": "refs/heads/master", "committer_date": 1544635865000, "content_id": "61dfa9b9c037c47fdf2e454cfad9db054b54a48d", "detected_licenses": [ "MIT" ], "directory_id": "a1e3b821da277adfe4af498e2fdfe7502019bf21", "extension": "py", "fi...
2.578125
stackv2
import cgi import mimetypes import os import pprint import time import traceback import urlparse import wsgi_proxy import golang def get_upload_dir(): path_dir = os.path.join(os.path.dirname(os.path.abspath(__file__)), 'USERRES') if not os.path.exists(path_dir): os.makedirs(path_dir, mode=0755) ...
225
30.29
130
19
1,685
python
[{"finding_id": "codeql_py/path-injection_6e308c3e5ec2ed9d_14b25a6d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 174 ]
[ null ]
[ 15 ]
[ 19 ]
2024-11-19T03:44:09.397432+00:00
1,675,242,871,000
dc4693d8c26fa0ed229a6307e4763789ce602245
3
{ "blob_id": "dc4693d8c26fa0ed229a6307e4763789ce602245", "branch_name": "refs/heads/master", "committer_date": 1675242871000, "content_id": "6cc3bd53065c79ef0115b28ab1cb041c149a9065", "detected_licenses": [ "MIT" ], "directory_id": "6d4e46adfe4f393b27d6443e5e8027b56ffcc0c9", "extension": "py", "fi...
2.671875
stackv2
# -*- coding: utf-8 -* #import socket module from socket import * import sys import re import ssl import traceback ########################################################## #global params ########################################################## HOST = "127.0.0.1" PORT = 8800 FILE = "index.html" ssl_version = None...
145
32.2
90
13
1,180
python
[{"finding_id": "codeql_py/insecure-protocol_689d7e4439bc0cff_153224f0", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 84 ]
[ null ]
[ 16 ]
[ 26 ]
2024-11-19T03:44:29.080110+00:00
1,632,274,487,000
ff2838d6a20fd140221b308c7c68580d5fe3bcbc
3
{ "blob_id": "ff2838d6a20fd140221b308c7c68580d5fe3bcbc", "branch_name": "refs/heads/main", "committer_date": 1632274487000, "content_id": "d6d562e8e912ee68bde36a0b16f649bd1733f0d4", "detected_licenses": [ "MIT" ], "directory_id": "e006165fde69995b3cb257f4c556b6f4ca13c16c", "extension": "py", "file...
2.6875
stackv2
from flask import Flask, app, jsonify, request, redirect, make_response from leer_modelo import predecir ALLOWED = { "png", "jpg", "jpeg", "gif" } def evaluar_extencion_archivo(filename): # queso.jpg # ["queso", "jpg"] tiene_punto = "." in filename # True, False if tiene_punto: extencion_filena...
50
29.68
71
14
397
python
[{"finding_id": "codeql_py/flask-debug_b06abdd0bffeb8ee_b1e4eae9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 49, 35, 38 ]
[ null, null, null ]
[ 5, 22, 22 ]
[ 51, 33, 33 ]
2024-11-19T02:08:52.120582+00:00
1,516,807,194,000
3aa2e20ff1ba192b7e264ec3acc17b04c82e9d62
2
{ "blob_id": "3aa2e20ff1ba192b7e264ec3acc17b04c82e9d62", "branch_name": "refs/heads/master", "committer_date": 1516807194000, "content_id": "0122d7a0643d5543c0e339b48f7fc5edc80f7219", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e2519ac43e2db404d8d3dc527cb9ba18664c5be0", "extension": "py"...
2.390625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- __author__ = 'jiavan' import os import json import logging import socketserver import threading import time import socket import hashlib import struct def get_table(key): m = hashlib.md5() m.update(key.encode('utf-8')) s = m.digest() (a, b) = struct.unp...
107
26.02
138
26
686
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f022f14a5c7ed05f_587d9eec", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 18 ]
[ null ]
[ 14 ]
[ 33 ]
2024-11-19T02:21:36.904085+00:00
1,579,268,021,000
dbb2cc3c343f605ce058e3ed8c0b22bcfe18948c
3
{ "blob_id": "dbb2cc3c343f605ce058e3ed8c0b22bcfe18948c", "branch_name": "refs/heads/master", "committer_date": 1579268021000, "content_id": "7d1e383d5bcf717d5bbe215071c5b8ec356a502d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ce729906834ccbd8da28f1ad44802b1bfb628575", "extension": "py"...
2.78125
stackv2
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes from cryptography.hazmat.backends import default_backend from set2.padding import pkcs7_padding, pkcs7_strip from random import randint import os backend = default_backend() def encrypt_aes_128_ecb(msg, key): padded_msg = pkcs7_padding(m...
27
34.96
76
10
263
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_7d25b2b726ef0854_94fd2b6c", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 13, 18 ]
[ null, null ]
[ 12, 23 ]
[ 40, 45 ]
2024-11-19T02:58:15.412535+00:00
1,535,116,250,000
540c7f11077408eb5c770bfc072b6894aa981e40
2
{ "blob_id": "540c7f11077408eb5c770bfc072b6894aa981e40", "branch_name": "refs/heads/master", "committer_date": 1535116250000, "content_id": "59ebaac7c5327b9cafe1a4dc17ab9ac2e5986a5b", "detected_licenses": [ "MIT" ], "directory_id": "cda1b556f295abf075e74ca76c892879c119ee02", "extension": "py", "fi...
2.359375
stackv2
from django.contrib.contenttypes.models import ContentType from django.contrib.contenttypes.fields import GenericForeignKey from django.db import models from django.template.defaultfilters import slugify from .helpers import get_youtube_data, get_vimeo_data, get_ustream_data from .managers import VideoManager, Publish...
108
32.06
87
14
758
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f2a40ad97f7c7163_c778d566", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [vimeo.com/](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [vimeo.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 71 ]
[ null ]
[ 16 ]
[ 40 ]
2024-11-19T03:10:11.672299+00:00
1,520,845,627,000
716193eb409c510a0f330fd040c676c5c0463667
2
{ "blob_id": "716193eb409c510a0f330fd040c676c5c0463667", "branch_name": "refs/heads/master", "committer_date": 1520845627000, "content_id": "91ef5e1380027f37fcc2f3889c690bfd7d1fcdae", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4d3fc5446d7027e30d16b443e1c5592759994351", "extension": "py"...
2.46875
stackv2
# -*- coding: utf-8 -*- ''' Set Up: ::python 3(preferred) flavor of (miniconda) installed Usage: ::mal_file -> a file name containing malicious strings: 'xss.txt' OR -> a list of values haing malicious strings : ["alert}>'><script>alert(<fin2000>)</script>", "<script>alert(<fin...
117
35.65
149
16
834
python
[{"finding_id": "codeql_py/request-without-cert-validation_bcfe7bb2862def7d_2157ad88", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 42 ]
[ 44 ]
[ 20 ]
[ 40 ]
2024-11-19T03:10:13.920937+00:00
1,519,363,193,000
d65dd7fd2c32f6fe485749419e52efb263eefb7e
3
{ "blob_id": "d65dd7fd2c32f6fe485749419e52efb263eefb7e", "branch_name": "refs/heads/master", "committer_date": 1519363193000, "content_id": "5c2d16d34326443bf8c3a8d7a001e304b94cc787", "detected_licenses": [ "MIT" ], "directory_id": "a8a5c303d8f65ba4087eb41f5ecfad86ebfa39aa", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import sys import json from contextable import Contextable from terms import Terms from item import ItemCollection from company import Company from constants import DocumentTypes import jinja2 from hashlib import sha1 import datetime import subprocess import os path = '/'....
136
34.03
79
23
1,065
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f9e1385e08de09e5_66db2106", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ 18 ]
[ 9 ]
[ 31 ]
2024-11-19T03:10:31.418649+00:00
1,625,847,863,000
138c1f38a6c231fa875cdccded3a78b05b7b8ac0
3
{ "blob_id": "138c1f38a6c231fa875cdccded3a78b05b7b8ac0", "branch_name": "refs/heads/main", "committer_date": 1625847863000, "content_id": "8b71a2da41e41bced52cf4dec7ac34944ae18118", "detected_licenses": [ "MIT" ], "directory_id": "c745e2496778e2faf867ade7d920edefeef7dfe1", "extension": "py", "file...
2.8125
stackv2
from Crypto.Cipher import DES def decrypt(key: bytes, s: str): d = DES.new(key, DES.MODE_ECB) dd = d.decrypt(bytes.fromhex(s)) pad_num = dd[-1] res_str = dd[:-pad_num].decode('utf-8') return res_str def encrypt(key: bytes, s: str): d = DES.new(key, DES.MODE_ECB) s = s.encode('utf-8') ...
17
23.71
43
11
135
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_669821cc8d7f6f39_e13f79b7", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used." ]
[ 6, 17 ]
[ null, null ]
[ 10, 22 ]
[ 37, 34 ]
2024-11-19T03:22:49.186746+00:00
1,645,041,830,000
a520c984c25cb12dc7c411493e34bbf180d3297a
3
{ "blob_id": "a520c984c25cb12dc7c411493e34bbf180d3297a", "branch_name": "refs/heads/master", "committer_date": 1645041939000, "content_id": "d14f007bae38376a5dbb92ea87f48c0e8e94c9e8", "detected_licenses": [ "MIT" ], "directory_id": "af29c7ef057ef4b99e69c1353ba7b3670128df8a", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python3 # Copyright (c) 2022 Glynn Forrest # MIT licensed, see LICENSE.txt for details. # This script is an extract from the full vault-helper.py script I use # with clients. Any other version I have given to you is still # licensed under those original terms. import argparse, os, sys, requests, json...
440
32.18
167
26
2,942
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_87a4ca18ff7c32a5_090b59d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secre...
[ 178, 181, 186, 189 ]
[ null, null, null, null ]
[ 23, 19, 19, 19 ]
[ 92, 93, 86, 142 ]
2024-11-19T03:22:55.363736+00:00
1,635,450,248,000
5829679abacd13dd7064e0645598bf3db0a3e1f5
2
{ "blob_id": "5829679abacd13dd7064e0645598bf3db0a3e1f5", "branch_name": "refs/heads/main", "committer_date": 1635450248000, "content_id": "20d8aacd68af387ad1baae24300bd87d0cdcb95a", "detected_licenses": [ "MIT" ], "directory_id": "76b7e939ea4b441e01da31e9ed765a944077c5b7", "extension": "py", "file...
2.390625
stackv2
from flask import Flask, render_template, request import os from google.cloud import datastore import time from datetime import datetime from datetime import timezone import logging from opencensus.ext.azure.log_exporter import AzureLogHandler from opencensus.ext.azure.trace_exporter import AzureExporter from opencensu...
108
31.26
151
15
848
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_06a461993d15f696_17bb3bdb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 71 ]
[ null ]
[ 11 ]
[ 20 ]
2024-11-19T03:44:01.763681+00:00
1,631,129,538,000
d901d9124e2af6d320b03d5687eb6a9805346ccd
2
{ "blob_id": "d901d9124e2af6d320b03d5687eb6a9805346ccd", "branch_name": "refs/heads/main", "committer_date": 1631129538000, "content_id": "a9318a949af31a25c5334df8931ead57aaa80ff3", "detected_licenses": [ "MIT" ], "directory_id": "f5783ba18a96869d552517566b1a3d9f8de086da", "extension": "py", "file...
2.40625
stackv2
from flask import Blueprint, request, jsonify, render_template import hotspot.constants as constants import hotspot.utils as utils import os.path import subprocess import pprint hotspot_bp = Blueprint('hotspot', __name__) @hotspot_bp.route('/api/hotspot', methods=['GET']) def api_get(): rtn = {} try: data =...
198
31.92
105
19
1,686
python
[{"finding_id": "codeql_py/overly-permissive-file_9d4be8dfaae4d228_8733ac79", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 90, 112 ]
[ null, null ]
[ 3, 3 ]
[ 51, 52 ]
2024-11-19T01:34:56.142451+00:00
1,642,056,716,000
88c38313690cb1e77ba79b55af2fd436d0062009
2
{ "blob_id": "88c38313690cb1e77ba79b55af2fd436d0062009", "branch_name": "refs/heads/master", "committer_date": 1642056716000, "content_id": "1e0b27d821f820a0a93fffe36019eb95f849d056", "detected_licenses": [ "MIT" ], "directory_id": "08f1bf41d57e70398576f4a4be6999734131751f", "extension": "py", "fi...
2.359375
stackv2
import io import logging import os import re import requests import subprocess from sys import platform import zipfile from selenium.common.exceptions import NoSuchElementException from selenium.webdriver import ChromeOptions from seleniumrequests import Chrome logger = logging.getLogger(__name__) def get_webdriver...
169
32.95
79
12
1,228
python
[{"finding_id": "codeql_py/overly-permissive-file_5df9ca266bc5e778_0fb2cf06", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 168 ]
[ null ]
[ 5 ]
[ 43 ]
2024-11-19T01:35:01.820695+00:00
1,510,232,484,000
4e811a3f1abbca92dcf2faf254e14983c276d10f
3
{ "blob_id": "4e811a3f1abbca92dcf2faf254e14983c276d10f", "branch_name": "refs/heads/master", "committer_date": 1510244063000, "content_id": "5dd77fd11066970e951c92e8810569dde59f1e43", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6a6c2b922c3ff3d35622c8b9638426fb162b79ed", "extension": "py"...
2.515625
stackv2
import json import logging import os import shutil import tarfile import urllib import pnc_cli.utils as utils from argh import arg from pnc_cli import productmilestones from pnc_cli import buildrecords target="target/" tempdir="target/tmp/" @arg('-m', '--milestone_id', help='Product milestone id', type=int) @arg('-...
73
33.47
138
15
553
python
[{"finding_id": "codeql_py/tarslip_1c419d93ab8a4466_6d55d661", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 55 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T01:35:03.722767+00:00
1,689,662,804,000
795e4e3e13a04d3ea8569391f47c096d1d23712e
3
{ "blob_id": "795e4e3e13a04d3ea8569391f47c096d1d23712e", "branch_name": "refs/heads/master", "committer_date": 1689662804000, "content_id": "40f19f0df086f0bb58a7938733abe3a67856ee0b", "detected_licenses": [ "MIT" ], "directory_id": "62d3911c75715a54aa87becea8715c2173a33892", "extension": "py", "fi...
2.53125
stackv2
""" MIT License Copyright (c) 2019-2022 Jake Sichley Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publ...
322
30.18
118
15
2,227
python
[{"finding_id": "codeql_py/overly-large-range_ea873372d8ca0119_e937b3ef", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 178, 179 ]
[ null, null ]
[ 45, 55 ]
[ 48, 58 ]
2024-11-19T01:35:04.937624+00:00
1,585,284,727,000
d5fcb619a51f5734176b3b6b98c9e3ab94567bfe
3
{ "blob_id": "d5fcb619a51f5734176b3b6b98c9e3ab94567bfe", "branch_name": "refs/heads/master", "committer_date": 1585284727000, "content_id": "3ff22237597774d9e4af9adb9737c507ffa6dfab", "detected_licenses": [ "MIT" ], "directory_id": "78c98860d0588c11d0a2fe0ecc183f25b654323c", "extension": "py", "fi...
2.640625
stackv2
import os from flask import Flask from flask import jsonify from flask import request from flask import render_template from datetime import datetime, timedelta import psycopg2 import psycopg2.extras app = Flask(__name__) def create_app(): """ Create a Flask application using the app factory pattern. :par...
324
38.12
137
18
2,776
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_027ce9dd982dcf37_3e53f568", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
8
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This SQL query depends on a [u...
[ 123, 139, 249, 254, 146, 161, 175, 255 ]
[ null, null, null, null, 155, 170, 184, 264 ]
[ 31, 15, 15, 15, 21, 21, 21, 21 ]
[ 41, 22, 22, 24, 68, 68, 68, 57 ]
2024-11-19T01:35:05.108611+00:00
1,623,872,982,000
ebcb5db4a2a95e70384d0e85463dcf0989651062
3
{ "blob_id": "ebcb5db4a2a95e70384d0e85463dcf0989651062", "branch_name": "refs/heads/main", "committer_date": 1623872982000, "content_id": "c4cc0b35bb3201078a7f8e98d2bf34e98ecf3668", "detected_licenses": [ "MIT" ], "directory_id": "2e52171ccdda444bcf24e23562257b1174650b50", "extension": "py", "file...
2.9375
stackv2
"""Module for calculator service.""" import re from option import Result from option.result import Err from py_expression_eval import Parser from calculator_bot.model.calculator import Calculator from calculator_bot.repository import CalculatorRepository VALID_EXPRESSION = re.compile('[0-9./=+-c*]') class Calculat...
51
34.51
76
17
370
python
[{"finding_id": "codeql_py/overly-large-range_ce57172284a62412_f5d1fcf4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-c\\]." ]
[ 11 ]
[ null ]
[ 39 ]
[ 42 ]
2024-11-19T01:35:06.233863+00:00
1,622,192,480,000
64f08798cd422d50f2b049825fa4f823f12e05f5
2
{ "blob_id": "64f08798cd422d50f2b049825fa4f823f12e05f5", "branch_name": "refs/heads/master", "committer_date": 1622192480000, "content_id": "bcf572d79dca464b8c0b54b008e70caa33f75425", "detected_licenses": [ "MIT" ], "directory_id": "c3e4a90f1994564a39a2ff3289b160d78129c2f8", "extension": "py", "fi...
2.390625
stackv2
import requests, hashlib class Account: def __init__( self, agentId, agentPlatform, apiKey, transactionStatusUrl = 'http://35.204.26.22:8086/api/account/transaction/status/', balanceUrl = 'http://35.204.26.22:8086/api/account/agent/balance/v2/', changeKeyUrl ...
47
31.7
90
19
369
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5219a827c0569fe2_d5dd0470", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 24 ]
[ null ]
[ 28 ]
[ 75 ]
2024-11-19T01:35:07.137624+00:00
1,542,780,243,000
9869e03a4f172d79836fca9cee96ffe0c64d6d44
3
{ "blob_id": "9869e03a4f172d79836fca9cee96ffe0c64d6d44", "branch_name": "refs/heads/master", "committer_date": 1542780243000, "content_id": "786e21119fbdf8ff2a8080415481af1ea326ccb9", "detected_licenses": [ "MIT" ], "directory_id": "440ac3e09340b560a56648e41a028a93fa91b442", "extension": "py", "fi...
2.625
stackv2
import requests from bs4 import BeautifulSoup as Soup def get_links_to_offers(url: str) -> list: links = [] r = requests.get(url) html = Soup(r.text, 'html.parser') divs = html.findAll("div", {"class": "col-xxs-12 col-xs-6 col-sm-6 col-md-6 col-lg-6 no-gutter mb10"}) for i in divs: link = ...
34
28.5
106
13
281
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_5ccb654313f8d437_b9ce9d39", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.naturisimo.com/](1) may be at an arbitrary positio...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [www.naturisimo.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 25 ]
[ null ]
[ 30 ]
[ 59 ]
2024-11-19T01:55:45.217178+00:00
1,543,314,370,000
428cfa4a6d8efcd5b902c87dec46f703d0f95363
3
{ "blob_id": "428cfa4a6d8efcd5b902c87dec46f703d0f95363", "branch_name": "refs/heads/master", "committer_date": 1543314370000, "content_id": "a231ffe38bf025aeefb546dd7e9fc0e3584e9107", "detected_licenses": [ "MIT" ], "directory_id": "cc98e04de0030bfffea2dde2c38ffc6ffee5b37d", "extension": "py", "fi...
2.8125
stackv2
# -*- coding: utf-8 -*- import re import requests from bs4 import BeautifulSoup from bs4.element import Tag from django.utils.translation import get_language import six if six.PY3: unicode = str class BaseDataProvider(object): """ Basic data provider with base methods, helpers and universal parsers "...
193
30.37
78
22
1,496
python
[{"finding_id": "codeql_py/overly-large-range_c441a0d1688d9ae2_7e59f6d6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 99 ]
[ null ]
[ 58 ]
[ 61 ]
2024-11-19T01:55:51.870288+00:00
1,572,909,872,000
970166fe5ec930c7e3168646bf8ac66bb5b07e40
3
{ "blob_id": "970166fe5ec930c7e3168646bf8ac66bb5b07e40", "branch_name": "refs/heads/master", "committer_date": 1572909872000, "content_id": "424a42b0e747ad0faeca8ba4f53a476b7ed8df56", "detected_licenses": [ "MIT" ], "directory_id": "e034b5f75ee2b1526aec07e874cd9e15541d6f94", "extension": "py", "fi...
2.515625
stackv2
import tensorflow as tf import numpy as np import os import pandas as pd import re, string import emoji from nltk.stem.snowball import SnowballStemmer import nltk from nltk.corpus import stopwords nltk.download('stopwords') import nltk from nltk.corpus import stopwords nltk.download('stopwords') from keras.preprocessin...
287
27.11
113
20
2,358
python
[{"finding_id": "codeql_py/overly-large-range_0062f39a54f77c83_1d621937", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class." ]
[ 209, 209, 209 ]
[ null, null, null ]
[ 34, 37, 40 ]
[ 38, 41, 44 ]