added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T19:18:47.294486+00:00
1,670,496,785,000
7de464121acb4bc289939061a010d28e4eb018bd
2
{ "blob_id": "7de464121acb4bc289939061a010d28e4eb018bd", "branch_name": "refs/heads/master", "committer_date": 1670496785000, "content_id": "e1092d37c72fd0baab3f4418c17d3a8871bd1728", "detected_licenses": [ "MIT" ], "directory_id": "41c2cf68fa14ba91651620d545a4440b6712fe17", "extension": "py", "fi...
2.375
stackv2
import os import sys import jinja2 from rdflib import ConjunctiveGraph, URIRef from rdflib.namespace import DCTERMS, RDFS, FOAF from rdflib.namespace import Namespace FM = Namespace('https://purl.org/fair-metrics/terms/') fairGraph = ConjunctiveGraph() fairGraph.parse('http://purl.org/fair-ontology#', format='trig')...
169
34.04
119
16
1,412
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8739c0208cae2e61_a846e7ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 112 ]
[ 118 ]
[ 23 ]
[ 6 ]
2024-11-18T19:19:14.235878+00:00
1,553,607,538,000
fd192b7d231d15ff7aeb2478e576e4a82194e901
3
{ "blob_id": "fd192b7d231d15ff7aeb2478e576e4a82194e901", "branch_name": "refs/heads/master", "committer_date": 1553607538000, "content_id": "582728c58751220193b382189cf92434c89278d8", "detected_licenses": [ "MIT" ], "directory_id": "bb383b48a5d5530340fe303796da93d2f2940eb0", "extension": "py", "fi...
2.859375
stackv2
import requests import json import sys import time try: from urllib import quote # Python 2.X except ImportError: from urllib.parse import quote # Python 3+ from random import choice class Connect(): authorization = "Basic token" def __init__(self, node_ip, base_url): self.host = node_ip ...
118
35.24
110
18
791
python
[{"finding_id": "codeql_py/request-without-cert-validation_ebfc0ae8a1c59226_fd032df6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 49, 55, 65, 69 ]
[ 50, 59, null, 70 ]
[ 31, 31, 31, 31 ]
[ 63, 37, 99, 63 ]
2024-11-18T19:29:48.750339+00:00
1,643,398,436,000
5545351656c72df23f64ef9b230f50607adc4928
2
{ "blob_id": "5545351656c72df23f64ef9b230f50607adc4928", "branch_name": "refs/heads/master", "committer_date": 1643398468000, "content_id": "b807a8937b119385363f6722dd141447abdbf90b", "detected_licenses": [ "MIT" ], "directory_id": "adf0086a70cd101a22a99e45061cea7d1925e934", "extension": "py", "fi...
2.453125
stackv2
from aiohttp import web from pathlib import Path from glob import glob from collections import defaultdict import re async def index(request): index_page = """ <!DOCTYPE html> <html> <head> <title>Vuejspython</title> <link rel=stylesheet href="/static/picnic.min.css"> <style> body { margin: 2em; } </style> </head>...
65
29.88
98
17
529
python
[{"finding_id": "codeql_py/polynomial-redos_e3a120c2c65b24d2_c366df37", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
4
true
[ "CWE-1333", "CWE-1333", "CWE-022", "CWE-022" ]
[ "py/polynomial-redos", "py/polynomial-redos", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.", "This path depends on a [user-provided value](1).", ...
[ 46, 49, 34, 47 ]
[ null, null, null, null ]
[ 56, 32, 15, 15 ]
[ 68, 33, 16, 16 ]
2024-11-18T19:44:22.679481+00:00
1,602,972,824,000
80b2d9e10a48df86f8b26309fc939e5529ef7bf4
3
{ "blob_id": "80b2d9e10a48df86f8b26309fc939e5529ef7bf4", "branch_name": "refs/heads/master", "committer_date": 1602972824000, "content_id": "ecba9d3aa671ff373d44711bb14635fb28620981", "detected_licenses": [ "Unlicense" ], "directory_id": "82a80d9616e44b8b0c98548d873e0090ba16de51", "extension": "py",...
2.671875
stackv2
### # # # # Program Description : # Created By : Benjamin Kleynhans # Creation Date : August 19, 2020 # Authors : Benjamin Kleynhans # # Last Modified By : Benjamin Kleynhans # Last Modified Date : August 19, 2020 # Filename : filemanager.py # ### # Imports import os, subproc...
198
30.95
99
20
1,228
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_75dce00d5b0e57ac_9f0edf75", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 58 ]
[ null ]
[ 9 ]
[ 78 ]
2024-11-18T19:58:20.879173+00:00
1,416,762,137,000
83317034a660ebdae4fa70785a42b962d74e0906
3
{ "blob_id": "83317034a660ebdae4fa70785a42b962d74e0906", "branch_name": "refs/heads/master", "committer_date": 1416762137000, "content_id": "b33beac147d71eefe2ac5950a72d87e15180d65a", "detected_licenses": [ "MIT" ], "directory_id": "6cd686c10ad9d12ab518987ae91c9457976a69bf", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- #Polina Morozova 23.11.2014 import os import requests from http.server import HTTPServer, SimpleHTTPRequestHandler, BaseHTTPRequestHandler def get_weather_html(ip): r = requests.get('http://api.hostip.info/get_json.php?ip=%s' % ip) loc = r.json() r = requests.get('htt...
32
27.94
120
13
268
python
[{"finding_id": "codeql_py/partial-ssrf_353429a8f34f69ba_7331a8ce", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 10, 12 ]
[ null, null ]
[ 6, 6 ]
[ 68, 121 ]
2024-11-18T19:58:21.350266+00:00
1,376,288,073,000
021b7b72de03fd7041a7966f750c9ae7a4d32c40
3
{ "blob_id": "021b7b72de03fd7041a7966f750c9ae7a4d32c40", "branch_name": "refs/heads/master", "committer_date": 1376288073000, "content_id": "56e01ff4129a086c78e1b04578b5308df98e3291", "detected_licenses": [ "MIT" ], "directory_id": "80ccb8ec377284dfc0dda5d0c0af9e5b6ea17140", "extension": "py", "fi...
2.53125
stackv2
""" Released under the MIT License Copyright (c) 2013 Hashem Al-Dujaili """ import sys import re sys.path.insert(0, 'libs') import os import webapp2 import jinja2 from google.appengine.ext import ndb JINJA_ENVIRONMENT = jinja2.Environment( loader=jinja2.FileSystemLoader(os.path.dirname(__file__)), extensions=[...
125
30.32
77
19
814
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ea47c8dd63303191_6fc3e518", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ 15 ]
[ 21 ]
[ 42 ]
2024-11-18T20:10:21.440364+00:00
1,528,981,850,000
5c8a3dcabf99e033fc8320ffd7e1faf228f1b51a
2
{ "blob_id": "5c8a3dcabf99e033fc8320ffd7e1faf228f1b51a", "branch_name": "refs/heads/master", "committer_date": 1528981850000, "content_id": "8e3cac2a67926555b019e9b2a3a712261a11901f", "detected_licenses": [ "MIT" ], "directory_id": "19865fd153d76532943180f6f80546fb3c6534a5", "extension": "py", "fi...
2.390625
stackv2
from mtgsdk import Card from flask import Flask from flask import render_template from flask import jsonify from flask import request import os import json app = Flask(__name__) @app.route('/') def index(): return render_template('base.html') @app.route('/search', methods=['POST']) def search(): sets = '...
46
22.15
72
16
257
python
[{"finding_id": "codeql_py/path-injection_7b36649b6c16bb85_0340a109", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 28, 30, 39 ]
[ null, null, null ]
[ 27, 19, 15 ]
[ 36, 28, 24 ]
2024-11-18T20:10:23.025430+00:00
1,609,939,659,000
6cb1a362fb2d0fc2b2d7aaf5f30eb783c64817ed
2
{ "blob_id": "6cb1a362fb2d0fc2b2d7aaf5f30eb783c64817ed", "branch_name": "refs/heads/master", "committer_date": 1609939659000, "content_id": "5515d722d44a032d385bf78873fbbcc04fcddc9d", "detected_licenses": [ "CC0-1.0" ], "directory_id": "e9eb6536e5e5482ec69a6345b8eb643b385f9a81", "extension": "py", ...
2.5
stackv2
import flask import json import nlp import logging from time import gmtime, strftime app = flask.Flask(__name__) logging.basicConfig( level=logging.DEBUG, filename='log.log', format='%(levelname)s:%(name)s:%(asctime)s:%(message)s') @app.route('/', methods=['GET', 'POST']) def home(): gen = flask.reque...
54
31.17
154
22
408
python
[{"finding_id": "codeql_py/log-injection_d72ffb256a542ef2_a0d8bb65", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 25, 41, 44, 47 ]
[ null, null, null, null ]
[ 18, 54, 54, 50 ]
[ 20, 62, 62, 58 ]
2024-11-18T20:10:24.682108+00:00
1,454,118,906,000
f473357bf5cb16a11bd4375de27df34eeac77db0
3
{ "blob_id": "f473357bf5cb16a11bd4375de27df34eeac77db0", "branch_name": "refs/heads/master", "committer_date": 1454118906000, "content_id": "f101aced0f3df3eb138d1d154dcb06080060161d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bb83a87e184bf33f09778f485032e0b5573741f8", "extension": "py"...
2.984375
stackv2
"""Manages problems within the app, including their creation, deletion, updating, and retreival. Functions: url_for_problem -- returns the route for the pdf description of a problem given an argument that has a 'pid' field. get_problem -- returns a JSON representation of an individual problem, ...
345
34.4
85
17
2,541
python
[{"finding_id": "codeql_py/path-injection_1bdbe76c995c5dcc_3d84dec6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 195, 333 ]
[ null, null ]
[ 19, 13 ]
[ 69, 80 ]
2024-11-18T20:10:31.158679+00:00
1,570,462,906,000
3d14c1b9097743c862ff45c2388dc05b96dbd029
3
{ "blob_id": "3d14c1b9097743c862ff45c2388dc05b96dbd029", "branch_name": "refs/heads/master", "committer_date": 1570462906000, "content_id": "8686b5298660e5e57385d6e45d10550587537132", "detected_licenses": [ "MIT" ], "directory_id": "7d8e3dc8392d4a77913a4b48152f3cbdce6765d6", "extension": "py", "fi...
2.875
stackv2
from urllib.parse import urljoin, urlparse import logging import sys import requests from requests.packages.urllib3.exceptions import InsecureRequestWarning from bs4 import BeautifulSoup requests.packages.urllib3.disable_warnings(InsecureRequestWarning) # TODO: Detect redirect statuses class Vamp(object): def ...
181
28.61
107
16
1,067
python
[{"finding_id": "codeql_py/request-without-cert-validation_4234598880a25672_b9698892", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 57 ]
[ null ]
[ 24 ]
[ 56 ]
2024-11-18T20:23:31.318199+00:00
1,640,761,054,000
18f1a8ed4139a6aa78726aa953553a38ab93c345
3
{ "blob_id": "18f1a8ed4139a6aa78726aa953553a38ab93c345", "branch_name": "refs/heads/master", "committer_date": 1640761054000, "content_id": "8f4806c270bdf959ba685058be5226d45919621b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fcd4373574558216d6b7f0af9859415b426d6978", "extension": "py"...
2.515625
stackv2
# Copyright 2019 Matthew Hayes # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, s...
367
43.58
150
23
3,595
python
[{"finding_id": "codeql_py/redos_57b38fbdd4428880_a666987f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{{{' and containing many repetit...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '{{{{' and containing many repetitions of ':'." ]
[ 111 ]
[ null ]
[ 26 ]
[ 28 ]
2024-11-18T20:49:37.776706+00:00
1,502,914,565,000
f3a669e1275c70162db542aa3055bc37b44b771e
3
{ "blob_id": "f3a669e1275c70162db542aa3055bc37b44b771e", "branch_name": "refs/heads/master", "committer_date": 1502914565000, "content_id": "28ec2d89ad8ce29a9ec68a6cf207b6114836df8c", "detected_licenses": [ "MIT" ], "directory_id": "673ab3b6390e7b6eaff827d74567357a8727a442", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python import argparse import json import jinja2 import webbrowser import graph if __name__ == '__main__': parser = argparse.ArgumentParser() parser.add_argument('groups', help='json file describing seed groups') args = parser.parse_args() # load group from file with open(args.gro...
37
28.16
100
16
267
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b651819623cfa659_8afafbab", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 21 ]
[ null ]
[ 20 ]
[ 45 ]
2024-11-18T20:49:58.123465+00:00
1,416,748,738,000
98e870850b80b7ebeb00a9563bc72d8dd5e4a078
2
{ "blob_id": "98e870850b80b7ebeb00a9563bc72d8dd5e4a078", "branch_name": "refs/heads/master", "committer_date": 1416748846000, "content_id": "92984f4ff556c6f0b6bd162d4cff637e578d70a8", "detected_licenses": [ "MIT" ], "directory_id": "1768d0f3f6ef46d07e5188f6821ef7c4fcfe8112", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python import os def dump_date(date): return date.strftime('%Y-%m-%dT%H:%M:%S.%fZ') class DumperNotFoundError(RuntimeError): pass class GPXDumper: TAB = ' ' def dump(self, activity): buffer = [] buffer.append('<?xml version="1.0" encoding="UTF-8"?>\n') buffe...
212
35.41
145
15
1,972
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0bd7868a54284e78_6a149c30", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive d...
[ 23, 105 ]
[ null, null ]
[ 35, 35 ]
[ 54, 54 ]
2024-11-18T20:50:08.659733+00:00
1,563,223,730,000
fd32d6b4b54fc572d981b35e165d87204b717775
2
{ "blob_id": "fd32d6b4b54fc572d981b35e165d87204b717775", "branch_name": "refs/heads/master", "committer_date": 1563223730000, "content_id": "c330f8f06c0f4902da537511cf30224fcb9ce6e8", "detected_licenses": [ "MIT" ], "directory_id": "d3410b6e43de10f8856bd8d64f89a14efb667543", "extension": "py", "fi...
2.359375
stackv2
"""A util script used on daryl's laptop to switch 'iemdb' /etc/hosts entry 129.186.185.33 iemdb iemdb2 #127.0.0.1 iemdb iemdb2 """ from __future__ import print_function import sys import tempfile import os def main(): """Go Main Go""" if len(sys.argv) == 1: print('Usage: python set_iemdb_etc_hosts.p...
49
31.39
74
14
569
python
[{"finding_id": "codeql_py/overly-permissive-file_0892e0f3be888405_b42bfff5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 45 ]
[ null ]
[ 5 ]
[ 34 ]
2024-11-18T20:50:44.703204+00:00
1,474,392,445,000
9ea348dbbe4f322e654b3a9fef34b59e926884dc
2
{ "blob_id": "9ea348dbbe4f322e654b3a9fef34b59e926884dc", "branch_name": "refs/heads/master", "committer_date": 1474392445000, "content_id": "fc576e6def224334a477d579812e44f400cd3059", "detected_licenses": [ "ISC" ], "directory_id": "285415071f1bb26c191ce105272a97070116e20c", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python # Copyright (c) 2014, Palo Alto Networks <techbizdev@paloaltonetworks.com> # # Permission to use, copy, modify, and/or distribute this software for any # purpose with or without fee is hereby granted, provided that the above # copyright notice and this permission notice appear in all copies. # # ...
193
29.59
172
13
1,315
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2efd08237841da86_adfb1472", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 109 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-18T21:14:07.033705+00:00
1,634,234,705,000
d764bd998c9868ffac1e0f8da5558adf4173aead
2
{ "blob_id": "d764bd998c9868ffac1e0f8da5558adf4173aead", "branch_name": "refs/heads/main", "committer_date": 1634234705000, "content_id": "a69429834f36194d3db2eded57cf0bc89f8faede", "detected_licenses": [ "MIT" ], "directory_id": "830e45a8b3dcd6a3e1d21ade24730467a789f03f", "extension": "py", "file...
2.484375
stackv2
import requests from datetime import datetime, time def toTextFile(file_name, type): textfile = open(file_name, "w", encoding="utf8") for x in range(len(type)): textfile.write(str(type[x]) + "\n") textfile.close() URL = "https://api.acleddata.com/acled/read" PARAMS = { 'key': "*AdNpEvCqZWct!Q...
109
26.26
78
13
786
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fe5d69c2c4d95603_e8638b16", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 7 ]
[ null ]
[ 24 ]
[ 43 ]
2024-11-18T21:14:09.609355+00:00
1,631,482,603,000
9a5c1659515f9dbc92acd46b4f21f48fdcdc4087
3
{ "blob_id": "9a5c1659515f9dbc92acd46b4f21f48fdcdc4087", "branch_name": "refs/heads/main", "committer_date": 1631482603000, "content_id": "57b5d1767484533501af42bef140145398e5e874", "detected_licenses": [ "MIT" ], "directory_id": "91dbcaca6b047dd56cde4ddce1323aeb62a2182e", "extension": "py", "file...
2.875
stackv2
from models.Jogo import Jogo from tinydb import Query from extensions.database import jogos as table_jogos from flask import jsonify from datetime import datetime def cadastra_jogo(jogo: dict): novo_jogo = Jogo(**jogo) try: table_jogos.insert(dict(novo_jogo)) return jsonify({"status": True, "me...
51
39.51
120
19
579
python
[{"finding_id": "codeql_py/stack-trace-exposure_fa79abb4db2bb2b3_fc4ce8c5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
5
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 13, 27, 31, 43, 51 ]
[ null, null, null, null, null ]
[ 24, 32, 24, 24, 24 ]
[ 95, 115, 105, 105, 108 ]
2024-11-18T21:14:15.470162+00:00
1,629,937,078,000
05565858e071ce522d59fcec476b04ac5ba9a27d
4
{ "blob_id": "05565858e071ce522d59fcec476b04ac5ba9a27d", "branch_name": "refs/heads/main", "committer_date": 1629937078000, "content_id": "ace124197720801e0e3876e14924a3e54f3c4479", "detected_licenses": [ "MIT" ], "directory_id": "b1b5fd9142d7f933324b490325705220eac2de9e", "extension": "py", "file...
3.71875
stackv2
# -*- coding: utf-8 -*- """ Created on Tue Jul 6 12:33:43 2021 @author: user15 """ import string from random import choice pass_size = int(input("暗証番号の長さを記入して下さい \n -->")) # ask user if wants uppercase letters and symbols use_symbols = input("暗証番号には記号も使いますか (Y か N): \n -->") def containsLetterAndNumber(input): ...
53
26.58
80
12
429
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_9b28ecb8aaef2a18_c1d559ed", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 23, 28 ]
[ null, null ]
[ 21, 15 ]
[ 56, 43 ]
2024-11-18T21:14:18.293678+00:00
1,607,903,391,000
a6acbdf76cf3245573d367650c48c6a1ef357336
3
{ "blob_id": "a6acbdf76cf3245573d367650c48c6a1ef357336", "branch_name": "refs/heads/main", "committer_date": 1607903391000, "content_id": "1c9b4a34f6e1ef07d14c8631f4187ad771f46f6c", "detected_licenses": [ "MIT" ], "directory_id": "a69fd0898f5da62cd14f5a88725e9e6f838a1a1c", "extension": "py", "file...
2.78125
stackv2
# Import the class `Flask` from the `flask` module from flask import Flask, render_template, request, make_response from Resultsfromkeywordsearch import * from keywordsearchscript import * from twitter import * # Instantiate a new web application called `app`, with `__name__` representing the current file app=Flask(__...
139
28.11
118
13
911
python
[{"finding_id": "codeql_py/insecure-cookie_085c4e98b7a91fc7_9415e137", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
5
true
[ "CWE-614", "CWE-020", "CWE-020", "CWE-215", "CWE-1004" ]
[ "py/insecure-cookie", "py/cookie-injection", "py/cookie-injection", "py/flask-debug", "py/client-exposed-cookie" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Cookie is constructed from a [user-supplied input](1).", "Cookie is constructed from a [user-supplied input](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Sens...
[ 30, 29, 30, 136, 30 ]
[ null, null, null, null, null ]
[ 5, 31, 31, 5, 5 ]
[ 43, 40, 42, 24, 43 ]
2024-11-18T21:14:19.226281+00:00
1,559,219,987,000
314e66d22b8f92a4ac4a0ea6709bdf1c0f82c164
3
{ "blob_id": "314e66d22b8f92a4ac4a0ea6709bdf1c0f82c164", "branch_name": "refs/heads/master", "committer_date": 1559219987000, "content_id": "d1aa0fff4aacba059816c7869f140b93901071e5", "detected_licenses": [ "MIT" ], "directory_id": "4851efd6b18ffed7a31809fe0a34f0245ae8d332", "extension": "py", "fi...
2.859375
stackv2
import requests API_KEY = '39d6b0d3' class Movies: def __init__(self, ids=['tt0111161'], img_dir='.', movies=None): if movies is not None: self.movies = movies else: self.movies = dict() for m in ids: self.movies[m] = dict() # download information for the movie ...
56
26.05
66
23
378
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_dafe500e91ae740e_3188873d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 30 ]
[ null ]
[ 25 ]
[ 30 ]
2024-11-18T21:14:25.134508+00:00
1,687,191,311,000
6a5e3d3a2e2fc8c43bafe77db7d845443c944ed4
3
{ "blob_id": "6a5e3d3a2e2fc8c43bafe77db7d845443c944ed4", "branch_name": "refs/heads/master", "committer_date": 1687191311000, "content_id": "29e5d5b6a10bcbc990dc76087578739587476e66", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ea97980b8c9dbbf987b2e470cea11cedde8efb9f", "extension": "py"...
3.375
stackv2
"""Submodule for `MetadataConfig` configurable.""" import re from ..configurable import configurable, Configurable, opt_checked, ParseError, Unset @configurable(name='Metadata') class MetadataConfig(Configurable): """This configuration structure is used to identify and document objects within `vhdmmio`.""" ...
110
49.67
94
16
1,240
python
[{"finding_id": "codeql_py/overly-large-range_4262b1096827a6f5_3930e93d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class.", "remediation": "", "loc...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class." ]
[ 58 ]
[ null ]
[ 62 ]
[ 65 ]
2024-11-18T21:14:43.831749+00:00
1,487,360,126,000
40fdf3eff6b85643c3c0843d4ec7a06352e1c2e4
2
{ "blob_id": "40fdf3eff6b85643c3c0843d4ec7a06352e1c2e4", "branch_name": "refs/heads/master", "committer_date": 1487360126000, "content_id": "a4f125d694bd1988431d14fd0a543cd3ecd5ba8d", "detected_licenses": [ "MIT" ], "directory_id": "5b583a6e9279519cb72319213b7a55f3b8a074f2", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/python import os import requests from flask import Flask from flask import request import json import config import hmac import hashlib from payload import Issue, Comment, Push, Pipeline app = Flask(__name__) SECRET = hmac.new(config.SECRET, digestmod=hashlib.sha1) if config.SECRET else None @app.route(...
98
29.61
124
16
716
python
[{"finding_id": "codeql_py/flask-debug_603bc4fba1ddb485_dbebe7e6", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-295" ]
[ "py/flask-debug", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 94, 78 ]
[ 98, null ]
[ 5, 9 ]
[ 6, 81 ]
2024-11-18T20:48:22.415881+00:00
1,529,353,982,000
b5ce08ca0f6baf2f4fa543a29808ce491c306f80
2
{ "blob_id": "b5ce08ca0f6baf2f4fa543a29808ce491c306f80", "branch_name": "refs/heads/master", "committer_date": 1529353982000, "content_id": "b613610f1c408a6f1ab62f739a2c7c54fa4c8f9e", "detected_licenses": [ "MIT" ], "directory_id": "ca071d055e63851f848ce7051f2b64d60a3d1dd1", "extension": "py", "fi...
2.390625
stackv2
# -*- coding: utf-8 -*- """ Popbak makes it easy to back up a POP accessible email in box The email parsing portion of the code is based on code that I got from Larry Bates here: http://mail.python.org/pipermail/python-list/2004-June/265634.html author -- Jay Marcyes <jay@marcyes.com> todo -- this script is like 6 y...
513
29.52
111
20
3,526
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96d4789976b42d69_2d16b714", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 70 ]
[ null ]
[ 24 ]
[ 48 ]
2024-11-18T21:11:30.841371+00:00
1,581,933,163,000
5f75095452d07c4595968c4a67670d0712779a98
3
{ "blob_id": "5f75095452d07c4595968c4a67670d0712779a98", "branch_name": "refs/heads/master", "committer_date": 1581933163000, "content_id": "182682934c5a42b41998506a921beb77712311c9", "detected_licenses": [ "MIT" ], "directory_id": "fbfe4eaac5fe7b10ae69b0e9d6c2dd8dfa2046e7", "extension": "py", "fi...
2.59375
stackv2
"""login 初始化一个已登录的 session: ```python s = Session("username", "password") ``` 然后用此 Session 请求 jxgl.cqu.edu.cn 下的其他路径 """ import re from hashlib import md5 as rawmd5 from time import sleep import requests as r from bs4 import BeautifulSoup def md5(string: str) -> str: return rawmd5(string.encode()).hexdigest()...
95
33.48
144
17
954
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_84066aa3e5222790_fb49bbf4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 20 ]
[ null ]
[ 19 ]
[ 34 ]
2024-11-18T21:11:37.969874+00:00
1,626,381,261,000
3137ab4b52aa2dc96cf4d0723139fadcd3407618
3
{ "blob_id": "3137ab4b52aa2dc96cf4d0723139fadcd3407618", "branch_name": "refs/heads/master", "committer_date": 1626381261000, "content_id": "516aaa56b9a4c6d5e7485040e2ecf3ef93854684", "detected_licenses": [ "MIT" ], "directory_id": "aee26471570546255a0dea94086654b2327d2173", "extension": "py", "fi...
2.609375
stackv2
from flask import Blueprint, request, abort from modules import printer from .parsers import parse_invoice, parse_credit_note from json import dumps, loads from .auth import requires_auth api_blueprint = Blueprint('api', __name__) @api_blueprint.route('/print/invoice', methods=['POST']) @requires_auth def print_invo...
35
30.03
70
12
239
python
[{"finding_id": "codeql_py/reflective-xss_7e42f3c126da22e9_b17c58af", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 12 ]
[ 66 ]
2024-11-18T21:25:46.274122+00:00
1,573,621,165,000
72853b5309781a40fb634ddf5f9ec09911a08e58
3
{ "blob_id": "72853b5309781a40fb634ddf5f9ec09911a08e58", "branch_name": "refs/heads/master", "committer_date": 1573621165000, "content_id": "4d4e988dc9ee55304fa4b8bf8f0d2cb6ed8252aa", "detected_licenses": [ "MIT" ], "directory_id": "dc187345147cdac7e295d3ad9aa760b62141d054", "extension": "py", "fi...
2.515625
stackv2
""" get_model_zoo.py - Gets the desired entries in the model zoo and extracts them 7/24/2019 Holiday Pettijohn """ import os import glob import tarfile import six.moves.urllib as urllib if not os.path.isdir("model_zoo"): os.mkdir("model_zoo") url_base = 'http://download.tensorflow.org/models/object_detection/' mod...
29
36.1
110
11
365
python
[{"finding_id": "codeql_py/tarslip_bb6f3c41801a1cec_783e0d4b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 28 ]
[ null ]
[ 3 ]
[ 6 ]
2024-11-18T21:25:59.717949+00:00
1,679,126,407,000
7957d0fb747fccd90b8cb28e2fa2307cad62993c
3
{ "blob_id": "7957d0fb747fccd90b8cb28e2fa2307cad62993c", "branch_name": "refs/heads/master", "committer_date": 1679126407000, "content_id": "4f0952166820a9e7d097dbf009265d1e0b8d1f67", "detected_licenses": [ "MIT" ], "directory_id": "0cc2272755f051e1758facaaa7e7ade948a2d20f", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/env python """ Very simple HTTP server in python. Usage:: ./dummy-web-server.py [<port>] Send a GET request:: curl http://localhost Send a HEAD request:: curl -I http://localhost Send a POST request:: curl -d "foo=bar&bin=baz" http://localhost To make it accessible from the outside world...
79
22.97
75
17
462
python
[{"finding_id": "codeql_py/log-injection_9a92b71a151ee9f5_b39cb1f9", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 53 ]
[ null ]
[ 30 ]
[ 63 ]
2024-11-18T21:26:10.558644+00:00
1,691,921,807,000
afee398a9753bafb5b0054dee93fd0bed1be843d
3
{ "blob_id": "afee398a9753bafb5b0054dee93fd0bed1be843d", "branch_name": "refs/heads/master", "committer_date": 1691921807000, "content_id": "88e1f56ad2f59f98c26c33830e0350e35247f475", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "15227db766faabc2faed2f881f8896b920a85f1e", "extension": "p...
2.671875
stackv2
# -*- coding: utf-8 -*- from flask import Flask, render_template, request, make_response, abort from rtfcal import get_rtfs, results_to_ical, get_default_params, ZIP_CODE_PATTERN, EMPTY_CALENDAR_FILE from dateparser import parse from datetime import date, timedelta import logging logging.basicConfig(level=logging.INF...
106
35.77
117
15
1,010
python
[{"finding_id": "codeql_py/log-injection_398af877048a3d65_d0eb36f2", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 90 ]
[ null ]
[ 21 ]
[ 76 ]
2024-11-18T20:31:26.373096+00:00
1,399,049,181,000
dea1f1f1beb6baf512cb05e335aee73757697768
2
{ "blob_id": "dea1f1f1beb6baf512cb05e335aee73757697768", "branch_name": "refs/heads/master", "committer_date": 1399049181000, "content_id": "1f2a62f7b916876805e0ea2f73cdf28b01beeb9b", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "2c0a0325727a362f075d5c6a721317444b7afd30", "extension": "p...
2.3125
stackv2
from __future__ import with_statement __all__ = ["Source", "Template", "StaticFile", "DownloadSource"] import hashlib import os import urllib2 import urlparse from kokki import environment from kokki.exceptions import Fail class Source(object): def get_content(self): raise NotImplementedError() def...
112
36.62
116
22
875
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e3d6525f373dfe48_9cb3fef1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 68 ]
[ null ]
[ 33 ]
[ 95 ]
2024-11-18T20:59:41.066392+00:00
1,657,802,577,000
e530a3ca48ea886ec233de29707a43e2ba5ec356
3
{ "blob_id": "e530a3ca48ea886ec233de29707a43e2ba5ec356", "branch_name": "refs/heads/master", "committer_date": 1657802577000, "content_id": "2ad98aa4058600b05a2de1d2d4e9c9950cf505dc", "detected_licenses": [ "MIT" ], "directory_id": "c984f9878e76c0c98406686522b63b628c267235", "extension": "py", "fi...
2.703125
stackv2
from flask import * import hashlib import os import db from werkzeug.utils import * import uuid app = Flask(__name__) app.config['SECRET_KEY'] = '30ea67d46f46a8ca1e9a9d82' app.config['UPLOAD_FOLDER'] = './images' ALLOWED_EXTENSIONS = set(['png', 'jpg', 'jpeg', 'gif']) """ Creates a Database is already not present ""...
176
32.05
138
19
1,270
python
[{"finding_id": "codeql_py/flask-debug_aca68a4c82c7733b_5de16b68", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-327", "CWE-327", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (pas...
[ 171, 42, 81, 138, 144 ]
[ null, null, null, null, null ]
[ 5, 28, 36, 25, 25 ]
[ 49, 45, 53, 36, 36 ]
2024-11-18T20:59:46.930090+00:00
1,628,951,995,000
67a3b349b902d5c6ddc108db2c5518ddef3b9646
3
{ "blob_id": "67a3b349b902d5c6ddc108db2c5518ddef3b9646", "branch_name": "refs/heads/main", "committer_date": 1628951995000, "content_id": "8815d84ecab08004f473d1397311f29a5d123e06", "detected_licenses": [ "MIT" ], "directory_id": "81cf27e76b76fb4f2181155ae60eee9bf3d01a5e", "extension": "py", "file...
2.84375
stackv2
#VOICE ID FOR PA import pyttsx3 engine=pyttsx3.init() #defining the engine voices=engine.getProperty('voices') voices = engine.getProperty('voices') for voice in voices: # to get the info. about various voices in our PC print("Voice:") print("ID: %s" %voice.id) print("Name: %s" %voice.name) pr...
16
26.12
54
9
125
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03e3d4320fff42be_7b7b7611", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 15 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-18T21:10:21.655885+00:00
1,582,835,391,000
6a2c38d32b5bfe40d91569f3a5804017e5e18f79
3
{ "blob_id": "6a2c38d32b5bfe40d91569f3a5804017e5e18f79", "branch_name": "refs/heads/master", "committer_date": 1582835391000, "content_id": "51f75cba107b530043dd15f9440fa76d1a0b927a", "detected_licenses": [ "MIT" ], "directory_id": "7f88738dcea4fc92e63a23262175bbbd214af261", "extension": "py", "fi...
2.84375
stackv2
import logging import os from flask import Flask, render_template, jsonify, request from models.players import Player from services.play import do_move, start_game from services.utils import WHITE, BLACK logging.basicConfig(level=logging.DEBUG) logger = logging.getLogger(__name__) # Caching the players by name and...
171
29.89
120
17
1,257
python
[{"finding_id": "codeql_py/stack-trace-exposure_65d38ab404c2ae36_5c6ac756", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
15
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-215", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-inje...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 59, 92, 114, 134, 149, 161, 171, 29, 65, 76, 97, 100, 140, 142, 145 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 24, 24, 24, 24, 24, 24, 5, 49, 17, 26, 17, 26, 21, 26, 21 ]
[ 39, 40, 40, 40, 40, 40, 82, 53, 71, 63, 53, 63, 55, 63, 46 ]
2024-11-18T21:10:36.677611+00:00
1,591,668,519,000
439e5440c0d61cae304557dcebbabad9ed64b8b5
2
{ "blob_id": "439e5440c0d61cae304557dcebbabad9ed64b8b5", "branch_name": "refs/heads/master", "committer_date": 1591668519000, "content_id": "8d3291350d40c440be55846a25c930efe3029e72", "detected_licenses": [ "MIT" ], "directory_id": "f7b73dfe83a4536e87a2568eb7249d0e5562fd87", "extension": "py", "fi...
2.5
stackv2
import os,rarfile,zipfile,tarfile,re,sys import comics from shutil import copyfile from django.conf import settings from operator import attrgetter from . import fnameparser from . import utils from urllib.parse import quote class ComicFileHandler(object): def __init__(self): # Set the unrar tool based on filesyst...
271
28.92
134
21
2,018
python
[{"finding_id": "codeql_py/overly-permissive-file_4f566bfd09e09a7b_cbe78eb9", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
4
true
[ "CWE-732", "CWE-732", "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file", "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 52, 103, 157, 227 ]
[ null, null, null, null ]
[ 5, 4, 4, 4 ]
[ 30, 29, 29, 29 ]
2024-11-18T21:10:38.537334+00:00
1,612,019,244,000
7feb630cef9f3c607af1d895a3a5091a38e7fec6
4
{ "blob_id": "7feb630cef9f3c607af1d895a3a5091a38e7fec6", "branch_name": "refs/heads/master", "committer_date": 1612019244000, "content_id": "850fa9f6afce7815276a299977ddf552ec07ca74", "detected_licenses": [ "MIT" ], "directory_id": "530779b3c7438d456a3994d0b1af9c1eb6a251d2", "extension": "py", "fi...
4.125
stackv2
# Modules import string import random # Variables # I just wanted to do it this way.. # I know there are a lot of solution for this variables. pass_char0 = string.punctuation + string.ascii_letters + string.digits pass_char1 = string.ascii_lowercase + string.ascii_uppercase pass_char = pass_char0 + pass_char1 # User...
29
35
82
14
216
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_61488e4c8aa4a110_f0587b03", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 21 ]
[ null ]
[ 19 ]
[ 46 ]
2024-11-18T21:10:39.685185+00:00
1,581,377,425,000
e7ece888fcc8b72ab3bce64dbbb4d3613adbc1d1
3
{ "blob_id": "e7ece888fcc8b72ab3bce64dbbb4d3613adbc1d1", "branch_name": "refs/heads/master", "committer_date": 1581377425000, "content_id": "7b41f99d6b859229332813113f8b3e7430b3705e", "detected_licenses": [ "MIT" ], "directory_id": "fd0c0e1937d58b56f2a638317be6441fd79f15ab", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """Contains methods that reference APIs used by bot.""" import configparser from functools import lru_cache import logging import pixivpy3 # type: ignore from .exceptions import APIError @lru_cache(maxsize=32) def pixiv_tags(illust_id: int, conf: configparser.Sectio...
38
29.82
85
14
287
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d655ad6112d15208_c9ae8ab5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 30 ]
[ null ]
[ 18 ]
[ 85 ]
2024-11-18T21:10:40.221224+00:00
1,645,143,720,000
8f27cb6236cc072148580a60b3f8e061a63b5b33
2
{ "blob_id": "8f27cb6236cc072148580a60b3f8e061a63b5b33", "branch_name": "refs/heads/master", "committer_date": 1645143720000, "content_id": "709f43b12aea03c900bdd56a994f4d916f8e6da8", "detected_licenses": [ "MIT" ], "directory_id": "6e9dc0b30bdfb5d947caace3afb74a28a01d0b7c", "extension": "py", "fi...
2.46875
stackv2
import json import numpy as np import re model = { "harmonic": {"polynomial" : { "exponents": [[2]], "coefs": [0.5] }}, "cubic_decay": {"polynomial" : { "exponents": [[2],[3]], "coefs": [0.5, 1.0/6.0] }}, "anharmonic": {"polynomial" : { "exponents": [[2],[3],[4]]...
147
29
116
19
1,144
python
[{"finding_id": "codeql_py/overly-large-range_b29b219ae1bc1f49_c1284382", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 128 ]
[ null ]
[ 52 ]
[ 55 ]
2024-11-18T21:23:32.361624+00:00
1,682,129,739,000
4359e3e6d47cba187e6c95247c413309ec424283
2
{ "blob_id": "4359e3e6d47cba187e6c95247c413309ec424283", "branch_name": "refs/heads/master", "committer_date": 1682129739000, "content_id": "82096cb065040ae2286bdf48a732eebdd5f94ea5", "detected_licenses": [ "MIT" ], "directory_id": "7226485bcbac3ad5c832b0bcb6079e050d0950a1", "extension": "py", "fi...
2.40625
stackv2
import os import secrets from PIL import Image from flask import render_template, url_for, flash, redirect, request, abort from flaskblog import app, db, bcrypt from flaskblog.forms import RegistrationForm, LoginForm, UpdateAccountForm, PostForm, CommentForm from flaskblog.models import User, Post, Comment from flask_l...
305
39.75
150
19
2,620
python
[{"finding_id": "codeql_py/url-redirection_c23c8f71df0da571_bcd4d620", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 97 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-18T21:23:40.797789+00:00
1,469,964,188,000
152595d06583aebf7b20cdde674c232fd6b7f3ff
2
{ "blob_id": "152595d06583aebf7b20cdde674c232fd6b7f3ff", "branch_name": "refs/heads/master", "committer_date": 1469964188000, "content_id": "3624749e8c3ed8c9c79986ca4f6fb9d0c0380861", "detected_licenses": [ "MIT" ], "directory_id": "e399e13c326c5aa6f5994c729db65cbdafc35c80", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import os import json import logging import contextlib import traceback import tornado from jinja2 import Environment, FileSystemLoader, TemplateNotFound from ..status import OK from ..const import LOG_NAME log = logging.getLogger(LOG_NAME) def debug_wrapper(func): ...
125
25.95
76
14
697
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_37f8fe0127575ebb_d53d0590", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 43 ]
[ null ]
[ 15 ]
[ 66 ]
2024-11-18T21:23:41.042696+00:00
1,666,592,384,000
24b07d103a27ac261db1c999a2eac2b8387af79e
3
{ "blob_id": "24b07d103a27ac261db1c999a2eac2b8387af79e", "branch_name": "refs/heads/master", "committer_date": 1666592384000, "content_id": "61022bd093e815562389baefee2d9886e89d7170", "detected_licenses": [ "MIT" ], "directory_id": "c35d3b8dd68b305729f340da5e53139ff8c8eb17", "extension": "py", "fi...
2.890625
stackv2
#!/usr/bin/python3 from argparse import ArgumentParser, Action import sys import random from hashlib import md5 # We need a crypt module, but Windows doesn't have one by default. Try to find # one, and tell the user if we can't. try: import crypt except ImportError: try: import fcrypt as crypt except ImportE...
220
29.8
118
16
1,902
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_459bcb58b9f90a6f_d63d3d3c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
7
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 57, 60, 72, 81, 89, 94, 139 ]
[ null, null, null, null, null, null, null ]
[ 14, 17, 18, 21, 21, 21, 12 ]
[ 37, 43, 38, 29, 29, 29, 56 ]
2024-11-18T21:23:43.206727+00:00
1,420,490,827,000
0208dae8d4f1b6352851c7289bedd13f2d631776
3
{ "blob_id": "0208dae8d4f1b6352851c7289bedd13f2d631776", "branch_name": "refs/heads/master", "committer_date": 1420490827000, "content_id": "41c13f7777cbe4faaa2cb6263fd114b3e95fbae9", "detected_licenses": [ "MIT" ], "directory_id": "bf57d6243379bad4fdebc790d2515f0a5860091d", "extension": "py", "fi...
2.765625
stackv2
from flask import Flask from flask import request, redirect import os, subprocess, time app = Flask(__name__) PYTHON_PATH = '/home/dsa/Projects/notorious-app/bin/python2' ROOT_DIR = '/home/dsa/Projects/notorious-app/notorious/data/' @app.route("/") def hello(): return "Hello World!" ##Stuff for reading notes @ap...
74
27.53
118
12
545
python
[{"finding_id": "codeql_py/command-line-injection_0f9b5fecd97000aa_6f830d9f", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
6
true
[ "CWE-078", "CWE-079", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/command-line-injection", "py/reflective-xss", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).", "This path depends on...
[ 65, 37, 24, 42, 43, 44 ]
[ null, null, null, null, null, null ]
[ 35, 16, 18, 31, 25, 18 ]
[ 42, 42, 22, 35, 29, 22 ]
2024-11-18T21:23:45.442627+00:00
1,627,856,637,000
6c8aad0f29dfc4e7d42e18fd909d78ee6e430e90
3
{ "blob_id": "6c8aad0f29dfc4e7d42e18fd909d78ee6e430e90", "branch_name": "refs/heads/main", "committer_date": 1627856637000, "content_id": "e21b2322cf5b287c3ddecf4bc6378247f58d2c28", "detected_licenses": [ "MIT" ], "directory_id": "8e334a34508bd419ba200106ad93dfbee9a99ca5", "extension": "py", "file...
2.796875
stackv2
import uuid import socket import hashlib import logging import sqlite3 import argparse from datetime import date from datetime import datetime import pynmea2 # import bluetooth # Configuration BUFF_SIZE = 1024 # 4 KiB # Setup logging logger = logging.getLogger() logger.setLevel(logging.DEBUG) streamhandler = ...
188
27.99
155
21
1,141
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_16f1f3720281f7ed_322d7a86", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 122 ]
[ null ]
[ 34 ]
[ 52 ]
2024-11-18T21:37:23.705654+00:00
1,586,881,421,000
f7a5a8dcac16ff26ff3df603dc3f352d79bd1e30
2
{ "blob_id": "f7a5a8dcac16ff26ff3df603dc3f352d79bd1e30", "branch_name": "refs/heads/master", "committer_date": 1586881421000, "content_id": "ade5593d888f2c6137abcb968a7295d8354805da", "detected_licenses": [ "MIT" ], "directory_id": "e6d052d2e02720a9ca282a85091b52b7e898904f", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python3 import os import subprocess import sys import tempfile import time import json from datetime import datetime from jinja2 import Template class HealthError(Exception): """ This gets thrown if there is something wrong with the health of a service.""" def get_options(): options = {} ...
170
32.29
103
21
1,246
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_51b966a3617aa6b3_1266d5d3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 39 ]
[ null ]
[ 16 ]
[ 27 ]
2024-11-18T21:58:57.242235+00:00
1,594,135,608,000
01806ee36699d523ff509a8c8db93c3c1a46d1f7
3
{ "blob_id": "01806ee36699d523ff509a8c8db93c3c1a46d1f7", "branch_name": "refs/heads/master", "committer_date": 1594135608000, "content_id": "d04927db31d4a6ff6ff048fef26defb4b217de05", "detected_licenses": [ "MIT" ], "directory_id": "8d6a47cbe764cbc8c32234546f74c95f5e4cbeb3", "extension": "py", "fi...
2.734375
stackv2
import anndata import pandas as pd import numpy as np import os, sys import scanpy.api as sc sc.settings.verbosity = 0 from datasetuploader import FileType class MexUploader(FileType): """ Called by datasetuploader.py (factory) when a TAR archive (mexfiles_are_inside.tar) is being uploaded. """ def...
102
34.29
115
20
764
python
[{"finding_id": "codeql_py/tarslip_e02cd42639277d9f_7d12ac44", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 58 ]
[ null ]
[ 28 ]
[ 33 ]
2024-11-18T21:59:14.113103+00:00
1,693,318,965,000
04bff02b7171de0893ac0d13f302435fc9fc1cef
3
{ "blob_id": "04bff02b7171de0893ac0d13f302435fc9fc1cef", "branch_name": "refs/heads/master", "committer_date": 1693318965000, "content_id": "646652a3644edc7e09a44bb0ef52c92c8ff2b1c8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "29eac50cc208d8aaebde699e8c851ed84b2de591", "extension": "py"...
2.71875
stackv2
""" About the AudioMNIST corpus The AudioMNIST dataset consists of 30000 audio recordings (ca. 9.5 hours) of spoken digits (0-9) in English with 50 repetitions per digit for each of the 60 different speakers. Recordings were collected in quiet offices with a RØDE NT-USB microphone as mono channel signal at a sampling ...
146
31.95
88
16
1,206
python
[{"finding_id": "codeql_py/tarslip_9c12721d438d4772_038cb6ec", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 68 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T22:11:30.407869+00:00
1,619,788,571,000
c3a908761959c8b1bb596f83dd7ce67c0ac75ca4
3
{ "blob_id": "c3a908761959c8b1bb596f83dd7ce67c0ac75ca4", "branch_name": "refs/heads/main", "committer_date": 1619788571000, "content_id": "b24077ab0c0114a52f79535ec7020ec30b4f4569", "detected_licenses": [ "MIT" ], "directory_id": "108376f7eaa5b60ef95d931f7bb9206dcabfd372", "extension": "py", "file...
3.234375
stackv2
"""This module does to work with dataset""" import os import logging import string import math import re import pandas as pd import nltk from nltk.tokenize import word_tokenize from nltk.stem import WordNetLemmatizer try: nltk.find("stopwords") except LookupError: nltk.download("stopwords") try: nltk.find...
287
31.37
85
17
1,916
python
[{"finding_id": "codeql_py/overly-large-range_da311be49b8e8864_1a320cf5", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 108 ]
[ null ]
[ 53 ]
[ 57 ]
2024-11-18T22:24:09.855408+00:00
1,676,139,610,000
f484770ecac8a0e8cc5089c84272823aa6819b64
3
{ "blob_id": "f484770ecac8a0e8cc5089c84272823aa6819b64", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "59d06ad9e8b6f5096de9bf299d56059284adc1a1", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.578125
stackv2
import os def readCfg(location): # Make sure file exists... if not os.path.exists(location): return False with open(location) as f: cfg= {} for line in f: line = line.strip() # Ignore invalid lines if line and not line.startswith("#") and '=' in line: cfg[line.split('=', 1)[0]] = line.split('=', ...
18
24.56
56
17
130
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4313b170b3ee7a88_0d525b66", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ null ]
[ 8 ]
[ 41 ]
2024-11-18T22:24:15.134787+00:00
1,511,418,281,000
6358080c8f7c140c30df5a384467ec322b67e515
3
{ "blob_id": "6358080c8f7c140c30df5a384467ec322b67e515", "branch_name": "refs/heads/master", "committer_date": 1511418281000, "content_id": "bc64e29127d18d229172262bc4d9d496c71f1b0c", "detected_licenses": [ "MIT" ], "directory_id": "23bced53597c0cd9440292e6f9ad7338b82ddc50", "extension": "py", "fi...
3.1875
stackv2
""" This file is responsible for managing the encryption and the security of the application. The file implements functions which allow for encryption and decryption of messages using XOR, AES and RSA standards. """ import hashlib import binascii import Crypto.Cipher.XOR from Crypto.Cipher import AES from Crypto.P...
222
38.79
130
21
2,099
python
[{"finding_id": "codeql_py/weak-crypto-key_9a9599e1d0e213c5_c2f31790", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 24 ]
[ null ]
[ 11 ]
[ 47 ]
2024-11-18T22:24:18.996603+00:00
1,600,032,070,000
f777248e146e7c798ca83597105a031650c680ee
3
{ "blob_id": "f777248e146e7c798ca83597105a031650c680ee", "branch_name": "refs/heads/master", "committer_date": 1600032070000, "content_id": "234ed477653ff69e23a23a28680f5acf6ead768c", "detected_licenses": [ "MIT" ], "directory_id": "dcaa3a59f41675ccaf5edb7fd98221369d4ac309", "extension": "py", "fi...
2.59375
stackv2
from datetime import datetime, timedelta from math import floor from dotenv import load_dotenv from cryptography.fernet import Fernet from flask import Flask, request, jsonify, abort from flask_sqlalchemy import SQLAlchemy from flask_cors import CORS import bcrypt import os # Uncomment the following code block to inst...
243
33.23
106
18
1,815
python
[{"finding_id": "codeql_py/reflective-xss_43bf192b08da2fdf_b62c8a2c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 109, 123, 139 ]
[ null, null, null ]
[ 16, 16, 16 ]
[ 34, 28, 28 ]
2024-11-18T22:24:19.123442+00:00
1,529,942,469,000
ff691e7d3efb6ae3bf8a8330f49cb5493e72ef63
3
{ "blob_id": "ff691e7d3efb6ae3bf8a8330f49cb5493e72ef63", "branch_name": "refs/heads/master", "committer_date": 1529942469000, "content_id": "6c265a96191bdc13729bc8a782c01be4ac7f1d72", "detected_licenses": [ "MIT" ], "directory_id": "16617077b64f0ca90c1eb4ef317a87c3a1455404", "extension": "py", "fi...
2.625
stackv2
""" aiohttp demo server. """ import logging from aiohttp import web from smsdemo.constants import POST_PATH, SIGNATURE_HEADER_KEY from smsdemo.message import SMSMessage from smsdemo.util import ( ServerConfig, SMSSendError, parse_signature, generate_signature, async_send, ) async def receive_and_echo(r...
58
28.4
84
12
375
python
[{"finding_id": "codeql_py/log-injection_cedc44ada460e15f_d6264840", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 62 ]
[ 65 ]
2024-11-18T22:24:24.326253+00:00
1,528,426,972,000
558150d870bd1537c09b4c1eebcb77865afaf938
3
{ "blob_id": "558150d870bd1537c09b4c1eebcb77865afaf938", "branch_name": "refs/heads/master", "committer_date": 1528426972000, "content_id": "2e18eed7f1517072d8b4f5615e07fa01641191bc", "detected_licenses": [ "MIT" ], "directory_id": "75144eaef1e1211f281fa4fe43f36901f69dfafa", "extension": "py", "fi...
2.640625
stackv2
import os import sys import path import csv from sklearn.cluster import KMeans import numpy as np import matplotlib.pyplot as plt import requests from Coordinate import Coordinate from User import User from Cluster import Cluster from BusPath import BusPath class PathFinder: databasePath: str = path.Path.getcwd()...
147
33.9
139
29
1,115
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_2ec0576ee41111c4_bb18a203", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text." ]
[ 75 ]
[ 79 ]
[ 28 ]
[ 87 ]
2024-11-18T22:24:25.881154+00:00
1,517,088,256,000
3e6786a685356482b888042126dda86e94167bdc
3
{ "blob_id": "3e6786a685356482b888042126dda86e94167bdc", "branch_name": "refs/heads/master", "committer_date": 1517088256000, "content_id": "99016adea74932f2781e4ad1c7a35ca6ab220d33", "detected_licenses": [ "Apache-2.0" ], "directory_id": "157e8d06c85426bacf21a0f84b0be993ae300d5d", "extension": "py"...
2.53125
stackv2
#!/usr/bin/python3 from flask import Flask, jsonify, request, abort import time import os from googleapiclient import discovery from oauth2client.client import GoogleCredentials from pprint import pprint def get_input(inputfile): try: with open(inputfile, 'r') as input: data = input.read() ...
176
29.39
118
15
1,174
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d0e5fdc60fc75863_0e7c71fe", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 128 ]
[ null ]
[ 24 ]
[ 53 ]
2024-11-18T22:36:04.404960+00:00
1,671,450,258,000
547d09f35d9999c9139104c1f46d698cc8df26d9
2
{ "blob_id": "547d09f35d9999c9139104c1f46d698cc8df26d9", "branch_name": "refs/heads/master", "committer_date": 1671450258000, "content_id": "86c42c03739aa0a52b7dd99f6c579f5b2398e3ce", "detected_licenses": [ "MIT" ], "directory_id": "c6df8b3a5fdc19936a5bdfc6599d790c55cada90", "extension": "py", "fi...
2.4375
stackv2
import glob import json import logging import os import re import subprocess import jinja2 import rich import nf_core.utils log = logging.getLogger(__name__) def render_template(component_type, object_attrs, file_paths): """ Create new module/subworkflow files with Jinja2. """ # Run jinja2 for each...
177
45.08
119
19
1,861
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2bd02b4cec4645ed_2b26c745", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 21 ]
[ 23 ]
[ 11 ]
[ 6 ]
2024-11-18T22:36:19.987585+00:00
1,530,817,588,000
25124bdda2e4921c4b27342e0b7a2de9bba1eece
2
{ "blob_id": "25124bdda2e4921c4b27342e0b7a2de9bba1eece", "branch_name": "refs/heads/master", "committer_date": 1530820829000, "content_id": "b145fa4aada0ec33e47f076967cc0261787d553f", "detected_licenses": [ "BSD-3-Clause-Clear" ], "directory_id": "97afa3222a3ab29ac697dbef533fc0b8b3aac764", "extensio...
2.359375
stackv2
from flask import Flask, request from threading import Thread from slackclient import SlackClient from bubbles import initiate_bubbles, understand_message, finish_pending_bubbles, give_help import logging logging.basicConfig(level=logging.INFO) app = Flask(__name__) @app.route('/readiness_check', methods=['GET']) def...
48
29.27
91
16
348
python
[{"finding_id": "codeql_py/flask-debug_c1c481125fd3b737_9bc0569d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 48, 27 ]
[ null, null ]
[ 5, 16 ]
[ 49, 38 ]
2024-11-18T22:36:33.987654+00:00
1,559,042,663,000
fa1a6d8d4a63c617adb08fd6ac1007223c250f35
2
{ "blob_id": "fa1a6d8d4a63c617adb08fd6ac1007223c250f35", "branch_name": "refs/heads/master", "committer_date": 1559042663000, "content_id": "63765d5682b77bbb2f611f803139cce4543a1493", "detected_licenses": [ "Apache-2.0" ], "directory_id": "eeaa5086dc12873c60a2878469408aed4c7c8126", "extension": "py"...
2.421875
stackv2
#!/usr/bin/python3 # encoding: utf-8 """ @version: v1.0 @author: W_H_J @license: Apache Licence @contact: 415900617@qq.com @software: PyCharm @file: routes.py @time: 2019/5/27 17:51 @describe: 路由规则 """ import sys import os import sys from werkzeug.urls import url_parse from app.forms import EditProfileFor...
125
27.97
77
16
928
python
[{"finding_id": "codeql_py/url-redirection_fb65e3ef76f932bd_b503638b", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 72 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-18T22:36:36.773294+00:00
1,656,837,129,000
72f8f641163b9fa1d262f5b527907a4604162cba
3
{ "blob_id": "72f8f641163b9fa1d262f5b527907a4604162cba", "branch_name": "refs/heads/master", "committer_date": 1656837129000, "content_id": "778e84094abfab667d01cd53a28f8008f70100a0", "detected_licenses": [ "MIT" ], "directory_id": "53ca843a8011f6a563bd47ad5f6b013512cea9a8", "extension": "py", "fi...
3.21875
stackv2
from base64 import b64encode CONTENT_TYPE_VALUE = "application/json" class AuthType: NoAuth = "" BasicAuth = "basic" class NoAuth: def __init__(self): self.header = { "content-type": CONTENT_TYPE_VALUE, } class BasicAuth: def __init__(self, user_name, password): ...
44
22.59
81
13
255
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ec387defc625c338_c7e989c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 43, 44 ]
[ null, null ]
[ 11, 11 ]
[ 34, 37 ]
2024-11-18T20:23:12.461189+00:00
1,554,819,392,000
6e4f4d79e66d3da08e35b3b51cd84ac5a37c72ac
3
{ "blob_id": "6e4f4d79e66d3da08e35b3b51cd84ac5a37c72ac", "branch_name": "refs/heads/master", "committer_date": 1554819392000, "content_id": "b254bd44e4c6f3cd575cd40f6c5319863beb508e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5adb2bd05702cb98114305b3b4d08c518e867811", "extension": "py"...
2.765625
stackv2
''' Copyright 2019 Jacques Supcik Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software...
77
29.47
77
12
590
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a3faf6f66c4f4a02_693495e9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 45 ]
[ 57 ]
[ 11 ]
[ 6 ]
2024-11-18T20:23:22.698135+00:00
1,556,549,981,000
19b7ed0278153cd5127988c405ba82cc5c38df36
3
{ "blob_id": "19b7ed0278153cd5127988c405ba82cc5c38df36", "branch_name": "refs/heads/master", "committer_date": 1556549981000, "content_id": "4cac09f1f4f1a3d2b87abf742c64b8e8d12c0d1c", "detected_licenses": [ "MIT" ], "directory_id": "be548c3bac49514e0570cd66fdb60f8434df33a6", "extension": "py", "fi...
2.734375
stackv2
import os import re import shutil import sys import mistune from jinja2 import Environment, FileSystemLoader from jinja2.ext import Extension from aurora import utils from aurora.defaults import DEFAULTS class FrontMatterExtension(Extension): """ Frontmatter are not rendered by Jinja, instead we parse them ours...
150
36.59
79
21
1,184
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0e8bc0b4c5765fce_fd885223", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 51 ]
[ 54 ]
[ 20 ]
[ 30 ]
2024-11-18T21:22:39.547101+00:00
1,678,943,819,000
d57787c1eac834d5d0d4219aa0078fc91cd5138c
2
{ "blob_id": "d57787c1eac834d5d0d4219aa0078fc91cd5138c", "branch_name": "refs/heads/master", "committer_date": 1678943819000, "content_id": "416f4dd47096ebab36727aa280d15d60306d4948", "detected_licenses": [ "MIT" ], "directory_id": "7ddece1802cc6a684cf027443636a1c0819e38fb", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python __author__ = "hloverflow" __credits__ = ["stephenbradshaw"] from base64 import b64decode, b64encode from Crypto.Cipher import AES from Crypto import Random from flask import Flask, request from lxml import etree import cgi import traceback app = Flask(__name__) # Config stuff KEY = Random.new(...
119
25.75
101
15
887
python
[{"finding_id": "codeql_py/xxe_f8fd498b5c7480dc_3832f184", "tool_name": "codeql", "rule_id": "py/xxe", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "XML parsing depends on a [user-provided value](1) without guarding against external entity expansion.", "remediation": "", "locat...
4
true
[ "CWE-611", "CWE-611", "CWE-209", "CWE-215" ]
[ "py/xxe", "py/xxe", "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "XML parsing depends on a [user-provided value](1) without guarding against external entity expansion.", "XML parsing depends on a [user-provided value](1) without guarding against external entity expansion.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Fl...
[ 57, 96, 77, 119 ]
[ null, null, null, null ]
[ 29, 29, 12, 5 ]
[ 37, 37, 16, 40 ]
2024-11-18T21:23:13.731335+00:00
1,616,254,252,000
b81988a611c8d7e7689c8d2e52ffd8cdafc335c2
3
{ "blob_id": "b81988a611c8d7e7689c8d2e52ffd8cdafc335c2", "branch_name": "refs/heads/master", "committer_date": 1616254252000, "content_id": "c98886db47fbf7c312c0f5cedba13e8e0bde6e5f", "detected_licenses": [ "MIT" ], "directory_id": "6ea97e4fd9f60aa5b8ca5c1563d6312312505e7c", "extension": "py", "fi...
2.734375
stackv2
from flask import flash, redirect, render_template, request, url_for from flask_login import current_user, login_required, login_user, logout_user from werkzeug.urls import url_parse from app.extensions import db from app.models import Employee from . import auth from .forms import LoginForm, RegistrationForm @auth...
90
37.06
81
19
659
python
[{"finding_id": "codeql_py/url-redirection_5e75b99c076e055b_c3a20f58", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 73 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-18T21:51:39.529514+00:00
1,560,692,757,000
2891aef239729f79cb8b1834cd843d69004b3302
3
{ "blob_id": "2891aef239729f79cb8b1834cd843d69004b3302", "branch_name": "refs/heads/master", "committer_date": 1560692757000, "content_id": "c3f227ad7cc11cda982d500cde2a0dfb808a9143", "detected_licenses": [ "MIT" ], "directory_id": "5784c1bbce149e27d1e32953b799422e9bad6f1e", "extension": "py", "fi...
2.734375
stackv2
# -*- coding: utf-8 -*- import socket import threading from logging import getLogger from reopenwebnet import messages from reopenwebnet.password import calculate_password _LOGGER = getLogger(__name__) """ Terminology: request = string sent to gateway response = string sent from gateway frame = a string re...
249
31.23
128
17
1,780
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4fc437ab9c3972e3_435620cc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 149 ]
[ null ]
[ 34 ]
[ 38 ]
2024-11-18T21:51:44.945582+00:00
1,678,776,456,000
16ad2a7e86f21b2a50ac5d7451c091557662f785
2
{ "blob_id": "16ad2a7e86f21b2a50ac5d7451c091557662f785", "branch_name": "refs/heads/main", "committer_date": 1678776456000, "content_id": "fcb63ddf300a2c939264d92073f25fd7a6294227", "detected_licenses": [ "MIT" ], "directory_id": "306b52c3f52b62ad1178851631d6617b29a01178", "extension": "py", "file...
2.359375
stackv2
from http.server import BaseHTTPRequestHandler import os class Server(BaseHTTPRequestHandler): def do_GET(self): if self.path == '/': self.path = '/index.html' try: split_path = os.path.splitext(self.path) request_extension = split_path[1] if request_e...
23
31.57
52
18
160
python
[{"finding_id": "codeql_py/path-injection_7a312ec3262786f3_611dfdd9", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 11 ]
[ null ]
[ 26 ]
[ 39 ]
2024-11-18T21:51:45.583352+00:00
1,497,647,926,000
90659e885be6cdf76aba310f338b29d3ff1c89c5
3
{ "blob_id": "90659e885be6cdf76aba310f338b29d3ff1c89c5", "branch_name": "refs/heads/master", "committer_date": 1497647926000, "content_id": "998f44fe68b75c47feddc64a51acdf8c7e662cde", "detected_licenses": [ "MIT" ], "directory_id": "6e938c65a7c16c59f87549a0f7bf9b171e45cf5c", "extension": "py", "fi...
3.046875
stackv2
#!/usr/bin/env python3 """ The program for taking the information about letters on mail server using POP3 protocol. """ import sys from socket import socket, AF_INET, SOCK_STREAM, timeout from argparse import ArgumentParser from ssl import wrap_socket from logging import warning, error from os import linesep from lett...
153
27.67
89
15
1,043
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_828337fb4e612e18_b9a6faf3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-327", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/insecure-default-protocol", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "Call to deprecated method ssl.wrap_socket does ...
[ 133, 76, 80 ]
[ null, null, null ]
[ 26, 24, 24 ]
[ 40, 41, 41 ]
2024-11-18T22:02:46.271634+00:00
1,629,287,100,000
0b4625dc04fc541ed518f7fae80b70f473632b7b
2
{ "blob_id": "0b4625dc04fc541ed518f7fae80b70f473632b7b", "branch_name": "refs/heads/master", "committer_date": 1629287100000, "content_id": "465470c14fbf002b13a0df71ace4a268e9b648c1", "detected_licenses": [ "MIT" ], "directory_id": "98fe597cf62897cf2cdd91f5b8700badde4a665d", "extension": "py", "fi...
2.40625
stackv2
import os from flask import Flask, request, Response import requests import json from flask_caching import Cache app = Flask(__name__) app.config.from_mapping( {"DEBUG": True, "CACHE_TYPE": "simple", "CACHE_DEFAULT_TIMEOUT": 5400}) cache = Cache(app) def get_stream_links(file_id, base_url): import urllib.pa...
103
27.59
79
15
760
python
[{"finding_id": "codeql_py/full-ssrf_90d1575b2eeea722_d70fc730", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
3
true
[ "CWE-918", "CWE-079", "CWE-918" ]
[ "py/full-ssrf", "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 90, 98, 33 ]
[ null, null, null ]
[ 9, 9, 9 ]
[ 56, 43, 26 ]
2024-11-18T22:16:42.898325+00:00
1,616,522,795,000
36ecc833a282953c71e5517ae2f4a0ec509336de
3
{ "blob_id": "36ecc833a282953c71e5517ae2f4a0ec509336de", "branch_name": "refs/heads/master", "committer_date": 1616522795000, "content_id": "e90f6cbc2478724d43b12f2d77305b664ccf709b", "detected_licenses": [ "MIT" ], "directory_id": "130ae389f952e2b83b1c26ba3e43f593559413b9", "extension": "py", "fi...
2.875
stackv2
''' Example of Spotify client credentials flow. User can search artist names available in Spotify. Basic flow: Get authorization -> get access token -> access endpoints with token Note: Used in server-to-server authentication. Only can access endpoints that do not serve user data. Advantage of this flow ...
128
25.48
107
17
744
python
[{"finding_id": "codeql_py/log-injection_d93c9611d7b07f59_4dcd0cb9", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 114 ]
[ null ]
[ 21 ]
[ 27 ]
2024-11-18T22:27:44.334923+00:00
1,524,867,612,000
9e779d2de70201d2e462e22d86bb79d6913eb608
2
{ "blob_id": "9e779d2de70201d2e462e22d86bb79d6913eb608", "branch_name": "refs/heads/master", "committer_date": 1524867612000, "content_id": "4505d5f371bdf0c7326dc4a658e624febebe0638", "detected_licenses": [ "MIT" ], "directory_id": "df19c4e2ec0b27c392623faaf43f547c227362a3", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python # Example Redis authentication # # To use, add this to mosquitto.conf: # # auth_plugin /path/to/auth_plugin_pyauth.so # auth_opt_pyauth_module redis_auth # # Example: # # auth_plugin /usr/mosquitto_pyauth/auth_plugin_pyauth.so # auth_opt_pyauth_module redis_auth # # Then start the daem...
95
32.71
128
15
886
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ed78bfea66d03ebe_01024b6b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e...
[ 51, 89 ]
[ null, null ]
[ 26, 27 ]
[ 50, 60 ]
2024-11-18T22:28:15.613350+00:00
1,294,775,243,000
331163211bffdb4392203ffe95aef6dd6cf8464b
3
{ "blob_id": "331163211bffdb4392203ffe95aef6dd6cf8464b", "branch_name": "refs/heads/master", "committer_date": 1294775243000, "content_id": "d7cf65ea9ea0e49ebc9790fcdb3b165adefdebbe", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c9675e4346f2db1ef268754b09035d7d39310121", "extension": "p...
2.734375
stackv2
from base64 import b64decode try: from hashlib import sha256 except ImportError: # Python < 2.5 try: from Crypto.Hash import SHA256 sha256 = SHA256.new except ImportError: print "Update to python 2.5+, or install PyCrypto." raise ImportError, "No SHA256" from rivr.http impo...
80
26.15
76
14
470
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_27f70bd4d6b34fec_dc49a1c3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 56 ]
[ null ]
[ 23 ]
[ 31 ]
2024-11-18T22:44:20.563008+00:00
1,310,995,980,000
c95f190520f6051cce88fd37a1375f9ceb20c327
3
{ "blob_id": "c95f190520f6051cce88fd37a1375f9ceb20c327", "branch_name": "refs/heads/master", "committer_date": 1310995980000, "content_id": "bb73ad752c4040aafa4b763f180e362d03427245", "detected_licenses": [ "MIT" ], "directory_id": "ed6244b52b8dc2648c70ed5fe1c87e50028f8aa5", "extension": "py", "fi...
2.765625
stackv2
import hashlib, time, random def generate_nonce(bits, randomness=None): "This could be stronger" if bits%8 != 0: raise ValueError, "bits must be a multiple of 8" nonce = hashlib.sha1(str(randomness) + str(time.time()) + str(random.random()) ).hexdigest() nonce = nonce[:bits/4] ...
117
36.08
73
16
1,207
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bf7601efee4f90c9_7dadfd00", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally ex...
[ 37, 39 ]
[ null, null ]
[ 39, 40 ]
[ 40, 41 ]
2024-11-18T22:44:24.519619+00:00
1,481,470,044,000
615b563840dc21c45c2fbc6df66f546b7943f0cb
3
{ "blob_id": "615b563840dc21c45c2fbc6df66f546b7943f0cb", "branch_name": "refs/heads/master", "committer_date": 1481470044000, "content_id": "83af9b993b228210be72aa5e3cde339744f38168", "detected_licenses": [ "MIT" ], "directory_id": "c8223d2daa74d83c6245d74118d46672c5a2c3a3", "extension": "py", "fi...
3.15625
stackv2
#!/usr/bin/env python # # Initially based on sudoku-password card # # This software is in the public domain # # python password-card.py -c 100 -p 13 -n 10 # # Alexandre Dulaunoy (a<AT>foo.be) from optparse import OptionParser import sys from string import ascii_uppercase, ascii_lowercase, digits, punctuation from ran...
51
36.92
133
14
516
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd9602dfd8feda21_4cc47960", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 48 ]
[ null ]
[ 26 ]
[ 32 ]
2024-11-18T22:44:25.159893+00:00
1,563,267,321,000
b425700e81323ee94ab979f8ee0b59dc629f43a3
3
{ "blob_id": "b425700e81323ee94ab979f8ee0b59dc629f43a3", "branch_name": "refs/heads/master", "committer_date": 1563267321000, "content_id": "18945a59ff8093eff66e51999fcf976e41f1585a", "detected_licenses": [ "MIT" ], "directory_id": "46175d29093d824f3563230e43d5a7af799e6549", "extension": "py", "fi...
3.1875
stackv2
# -------------- ##File path for the file file_path def read_file(path): file=open(path,'r') sentence=file.readline() file.close() return sentence sample_message=read_file(file_path) #Code starts here # -------------- #Code starts here file_path_1 file_path_2 message_1=read_file(file_path_1) message...
119
17.61
70
12
595
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_53ffaa95c8da333f_3df945e2", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec...
[ 110, 111, 28, 52, 77, 99 ]
[ null, null, null, null, null, null ]
[ 13, 11, 7, 7, 7, 7 ]
[ 23, 21, 19, 19, 19, 19 ]
2024-11-18T22:44:47.591325+00:00
1,639,073,433,000
c0252944dc5f5213e799bab96efb55e411cdeb79
3
{ "blob_id": "c0252944dc5f5213e799bab96efb55e411cdeb79", "branch_name": "refs/heads/master", "committer_date": 1639073433000, "content_id": "c9f11080039a39f702cf2c093843a4f62a02a3f9", "detected_licenses": [ "MIT" ], "directory_id": "808f0471df8fdf6c904f55169dc58c4f824ccb58", "extension": "py", "fi...
2.84375
stackv2
#!/usr/bin/env python3 import sys import getpass import argparse import json import os import requests from requests.auth import HTTPBasicAuth from jinja2 import Template class imgRequestError(Exception): pass def parse_args(): """ CLI argument handling """ desc = 'Generate an HTML report of C...
93
31.72
117
13
737
python
[{"finding_id": "codeql_py/request-without-cert-validation_d59f33cb4b46388b_651900e4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-079" ]
[ "py/request-without-cert-validation", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 70, 63 ]
[ null, null ]
[ 17, 16 ]
[ 91, 46 ]
2024-11-18T20:37:01.910805+00:00
1,516,135,417,000
842d9d45f95e9b66ef1f38c895a1e687ab8afc9a
3
{ "blob_id": "842d9d45f95e9b66ef1f38c895a1e687ab8afc9a", "branch_name": "refs/heads/master", "committer_date": 1516135417000, "content_id": "10bb7d5ca798609813c1f999094e72b57462e6a7", "detected_licenses": [], "directory_id": "806a0d8e792f1a173c3e51bc7f75f3a1b2163ee0", "extension": "py", "filename": "cli...
2.5625
stackv2
from flask import Flask from flask_opentracing import FlaskTracer import lightstep.tracer import opentracing import urllib2 app = Flask(__name__) # one-time tracer initialization code ls_tracer = lightstep.tracer.init_tracer(group_name="example client", access_token="{your_lightstep_token}") # this tracer does not tr...
66
24.41
108
13
403
python
[{"finding_id": "codeql_py/partial-ssrf_d712a6a748c204d7_fa310470", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 13 ]
[ 33 ]
2024-11-18T20:59:58.815570+00:00
1,639,557,940,000
9b611560f61eff9b3113e16c48dd684ca2b38c0c
3
{ "blob_id": "9b611560f61eff9b3113e16c48dd684ca2b38c0c", "branch_name": "refs/heads/master", "committer_date": 1639557940000, "content_id": "5c4f781b74f737227d6e66bd9a42a7c921445214", "detected_licenses": [ "MIT" ], "directory_id": "54b4dfc5238cbfc0dc641474662e48266d748195", "extension": "py", "fi...
3.0625
stackv2
#!/usr/bin/env python # coding: utf-8 # # Discount Fetcher # ## Modules: # 1. Source website API/location # 2. Data cleansing # 3. Logging and reporting # 4. Notification # In[1]: # !pip install html5lib # In[2]: import os import requests from dotenv import load_dotenv # In[3]: from bs4 import BeautifulSo...
155
17.62
88
16
759
python
[{"finding_id": "codeql_py/request-without-cert-validation_eaa92e32d4f52238_a43c2de5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 64 ]
[ null ]
[ 13 ]
[ 89 ]
2024-11-18T21:01:22.309040+00:00
1,606,162,494,000
8e191b33a57e50c5e2ca4e5b4c140b18e34ba75a
3
{ "blob_id": "8e191b33a57e50c5e2ca4e5b4c140b18e34ba75a", "branch_name": "refs/heads/master", "committer_date": 1606162494000, "content_id": "4ffb3daa84d97c8e193ec249c6b3daca76be42ac", "detected_licenses": [ "MIT" ], "directory_id": "3d08c317ea23fc5c10511badb2b518803db3a0ba", "extension": "py", "fi...
2.8125
stackv2
import logging import jinja2 def render_html_factory(som, template_paths): """Create a render function using a som and a list of template dirs. :param som: site object model to use as source of contents :param template_paths: paths where to find the templates """ def render_html(root_src_path, ...
35
30.14
74
14
230
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f3c03aa371ca772e_6e8a7822", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 15 ]
[ 48 ]
2024-11-18T21:01:26.067584+00:00
1,466,464,396,000
05d7f686f55c96e9636faf590a37c235c15032cf
3
{ "blob_id": "05d7f686f55c96e9636faf590a37c235c15032cf", "branch_name": "refs/heads/master", "committer_date": 1466464396000, "content_id": "b9e8d837155b0dd9b8a1011ef84578d9ca7ea363", "detected_licenses": [ "MIT" ], "directory_id": "4f41123b78d09f01658e29ba3646e8044ef9c8f0", "extension": "py", "fi...
2.53125
stackv2
from flask import Flask, request, redirect, render_template, session, flash from mysql import MySQLConnector import re app = Flask(__name__) mysql = MySQLConnector(app,'emaildb') app.secret_key = "983248g923fiohf3u29idd21321" EMAIL_REGEX = re.compile(r'^[a-zA-Z0-9\.\+_-]+@[a-zA-Z0-9\._-]+\.[a-zA-Z]*$') @app.route('...
47
28.34
98
14
360
python
[{"finding_id": "codeql_py/flask-debug_b208d628b2e7e662_3ce82592", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-117" ]
[ "py/flask-debug", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1)." ]
[ 47, 44 ]
[ null, null ]
[ null, 45 ]
[ 20, 57 ]
2024-11-18T21:01:30.662086+00:00
1,512,547,770,000
3b1c2104419d937f28a6065311ce3e5f8448b008
3
{ "blob_id": "3b1c2104419d937f28a6065311ce3e5f8448b008", "branch_name": "refs/heads/master", "committer_date": 1512547770000, "content_id": "601a1064b8c784f72e76e086b42cffb1d4d259b0", "detected_licenses": [ "MIT" ], "directory_id": "f2341c3b1e0d0aad971c82f4cb2eb53f507927dd", "extension": "py", "fi...
2.59375
stackv2
import json import requests import random import hashlib #从百度申请 appid = '----------' secretKey = '------------' def trans(conent): url = "http://api.fanyi.baidu.com/api/trans/vip/translate" salt = random.randint(32768,65536) sign = appid + conent +str(salt)+secretKey sign = sign.encode("UTF-8") m ...
24
27.04
110
19
208
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_84e69c834b381979_38ffa081", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 16 ]
[ null ]
[ 14 ]
[ 18 ]
2024-11-18T21:25:36.673595+00:00
1,625,855,121,000
583dfc01e066f98e362b6faf02d4ecf9fe1109c7
3
{ "blob_id": "583dfc01e066f98e362b6faf02d4ecf9fe1109c7", "branch_name": "refs/heads/master", "committer_date": 1625855121000, "content_id": "08aeca7c3e0428d68969bb798e3aff04f8cb7f24", "detected_licenses": [ "MIT" ], "directory_id": "c430fa5eb15dd6423b88f292b240a901bf5ab410", "extension": "py", "fi...
2.6875
stackv2
"""Update the README.md with recent stargazers.""" import json import os from typing import List import requests from jinja2 import Environment, FileSystemLoader url: str = "https://api.github.com/graphql" query: str = """ { user(login: "Dineshkarthik") { repositories(first: 100, isFork: false, isLocked: false...
104
27.56
79
19
718
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f13879f31e9db373_58f8acc9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 92 ]
[ null ]
[ 11 ]
[ 42 ]
2024-11-18T21:51:13.161083+00:00
1,554,230,087,000
92408cbc9c3ab5357054421d704c9c0d9d2f208c
2
{ "blob_id": "92408cbc9c3ab5357054421d704c9c0d9d2f208c", "branch_name": "refs/heads/master", "committer_date": 1554230087000, "content_id": "aebc241f153b79969684a2d2b54eef2159a4379d", "detected_licenses": [ "MIT" ], "directory_id": "82d128bb0732f56e0d0934cc160cea29d9f656e8", "extension": "py", "fi...
2.421875
stackv2
import traceback import flask def run_server(host, port, obj): assert hasattr(obj, "get_http_endpoints"), "expected obj to have get_http_endpoints" obj_functions = obj.get_http_endpoints() app = flask.Flask(__name__) @app.route('/', defaults={'path': ''}, methods=("GET", "POST")) @app.route('/<p...
37
34.24
101
18
307
python
[{"finding_id": "codeql_py/stack-trace-exposure_30ec1c29b467f497_8b8be443", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 35 ]
[ null ]
[ 34 ]
[ 101 ]
2024-11-18T21:51:18.633548+00:00
1,606,162,917,000
36bc5cd62c9945fb420e7a84c1a8d9e2b1e41f69
2
{ "blob_id": "36bc5cd62c9945fb420e7a84c1a8d9e2b1e41f69", "branch_name": "refs/heads/master", "committer_date": 1606162917000, "content_id": "5e7ef92d723e2a0ebfd82c43c938793a7d95cef9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "87080ce7f439b76565bde1dfad49c3df85cc2ea2", "extension": "py"...
2.46875
stackv2
import os import sys import time import logging import ccxt from flask import Flask from ccxt.base.errors import NetworkError logger = logging.getLogger('werkzeug') if "gunicorn" in os.environ.get("SERVER_SOFTWARE", ""): logger = logging.getLogger("gunicorn.error") EXCHANGE = os.getenv("EXCHANGE", None) API_KEY ...
120
30.02
91
20
921
python
[{"finding_id": "codeql_py/stack-trace-exposure_3ef1a97aa5124444_606a012b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 65, 120 ]
[ null, null ]
[ 16, 5 ]
[ 34, 24 ]
2024-11-18T22:00:23.744644+00:00
1,662,129,430,000
d629b7003b6b9d31a0a322cdbfcc715273ce2d86
3
{ "blob_id": "d629b7003b6b9d31a0a322cdbfcc715273ce2d86", "branch_name": "refs/heads/master", "committer_date": 1662129430000, "content_id": "7c445031132246f7ae4b4a8a5a6c77f8c8d16121", "detected_licenses": [ "MIT" ], "directory_id": "171192a6e15466d084c588838e39d1d4c0661630", "extension": "py", "fi...
2.703125
stackv2
#! /usr/bin/env python import re from apkcli.plugins.base import Plugin class PluginUrls(Plugin): name = "urls" description = "Extract URLs from the DEX files" def add_arguments(self, parser): self.parser = parser def run(self, args, a, d, dx): dex_values = list(a.get_all_dex()) ...
25
28.64
122
19
203
python
[{"finding_id": "codeql_py/overly-large-range_a93603fdd9df2f28_27c43a45", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 20 ]
[ null ]
[ 68 ]
[ 71 ]
2024-11-18T22:01:12.515849+00:00
1,634,194,187,000
ec96e9a89d6c2b521eef3e07c48181afeee297c7
2
{ "blob_id": "ec96e9a89d6c2b521eef3e07c48181afeee297c7", "branch_name": "refs/heads/master", "committer_date": 1634194187000, "content_id": "3d54523f73c77712394f86a220d892dc05f29adf", "detected_licenses": [ "MIT" ], "directory_id": "f11ade7c5d05f8bf438b25057044974f7a8733e2", "extension": "py", "fi...
2.421875
stackv2
"""Class of TwitterAuthWebClientInterceptor.""" from threading import Lock from typing import List, Optional from stweet.auth import SimpleAuthTokenProvider, AuthTokenProvider from stweet.exceptions.too_many_requests_exception import TooManyRequestsException from stweet.http_request import RequestsWebClient, WebClient...
88
41.31
93
15
817
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_aa09116fbee258e0_086c2e4e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://api.twitter.com](1) may be at an arbitrary posi...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [http://api.twitter.com](1) may be at an arbitrary position in the sanitized URL.", "The string [https://api.twitter.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 45, 46 ]
[ null, null ]
[ 16, 19 ]
[ 63, 67 ]
2024-11-18T22:15:07.542134+00:00
1,674,135,460,000
3ec20f047fba9ed2ec1026ca82340436b68e7bac
3
{ "blob_id": "3ec20f047fba9ed2ec1026ca82340436b68e7bac", "branch_name": "refs/heads/master", "committer_date": 1674135460000, "content_id": "66ba21c4a51d45cc7f6549b3142c476539617847", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "704bff0cb5c5c500dda60b3ebe2882f455f710ae", "extension": "p...
3.03125
stackv2
# Author: Harold Clark # Copyright Harold Clark 2019 # from database import database from person import person from operator import attrgetter import sys import os class employee(person): """employee object subclassed from person""" def __init__(self, eid=None, firstname=None...
187
30.98
104
16
1,319
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71413a16b45f9a1c_2a7924d7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 185 ]
[ null ]
[ 11 ]
[ 12 ]
2024-11-18T22:25:59.322363+00:00
1,647,430,922,000
2fa502b70c3aa2c00c2b32a12b41bdee225cf774
3
{ "blob_id": "2fa502b70c3aa2c00c2b32a12b41bdee225cf774", "branch_name": "refs/heads/master", "committer_date": 1647430922000, "content_id": "03c7d02456f939aaa55186bf29b6fde38bf7eaa6", "detected_licenses": [ "MIT" ], "directory_id": "dc64ef12ec9062a7de187a3ab8bef202b3ff2127", "extension": "py", "fi...
2.5625
stackv2
import requests import json import spacy from prodigy import get_config rest_url = "http://ske.herkules.arz.oeaw.ac.at/run.cgi" spacy_model = "de_core_news_sm" config = get_config() try: user = config['api_keys']['ske_user'] except KeyError: user = "user" try: pw = config['api_keys']['ske_pw'] except Key...
83
28.81
81
15
603
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_868036755ba52a33_4aecd4a5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 78 ]
[ null ]
[ 11 ]
[ 15 ]
2024-11-18T22:26:00.187734+00:00
1,607,728,338,000
519e35b9bee4e71287a478ea6f026dd15001e641
3
{ "blob_id": "519e35b9bee4e71287a478ea6f026dd15001e641", "branch_name": "refs/heads/master", "committer_date": 1607728338000, "content_id": "63cadd7c32555dd50890283bfbd6126d01b2cd55", "detected_licenses": [ "MIT" ], "directory_id": "fdf7a5c98b3b4127bc1dedbd91f5815f32e05d62", "extension": "py", "fi...
2.546875
stackv2
import requests import urllib.parse import os import time import sys import yaml import re from sqlalchemy.sql import text from sqlalchemy.ext.declarative import declarative_base from sqlalchemy import create_engine, MetaData, Table from sqlalchemy.orm import sessionmaker, mapper if len(sys.argv) != 2: print("Us...
226
32.36
149
16
1,909
python
[{"finding_id": "codeql_py/request-without-cert-validation_d850d0d6c541bb0a_a5c7944f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 205 ]
[ null ]
[ 13 ]
[ 78 ]
2024-11-18T22:26:23.544325+00:00
1,568,100,651,000
043ff67491f1cf60cc61df674092096e4d40d18c
3
{ "blob_id": "043ff67491f1cf60cc61df674092096e4d40d18c", "branch_name": "refs/heads/master", "committer_date": 1568100651000, "content_id": "2ed1b30f4ee72d0c4a40199a1052c00033d3daf7", "detected_licenses": [ "MIT" ], "directory_id": "ccc58ba90a41f24b80936ef328aa5cb7424aa72e", "extension": "py", "fi...
2.796875
stackv2
import pymongo from pymongo.errors import DuplicateKeyError from flask import Flask, jsonify, request from check_hash_server import check_hash_server from search_db import searchdb import logging app = Flask(__name__) logging.basicConfig(filename="database_server_log.txt", format='%(asctime)s %(m...
164
29.59
74
22
1,112
python
[{"finding_id": "codeql_py/log-injection_5072a2eb5d49f1e1_994cfafe", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 129, 149 ]
[ null, null ]
[ 53, 62 ]
[ 55, 68 ]
2024-11-18T22:26:26.286044+00:00
1,682,973,176,000
70a9eb2d3139faec04ef7daa89342f13f525cb8d
2
{ "blob_id": "70a9eb2d3139faec04ef7daa89342f13f525cb8d", "branch_name": "refs/heads/master", "committer_date": 1683589554000, "content_id": "f9ed4fb915e3efcea96f09fb882d8a605d48ca4a", "detected_licenses": [ "MIT" ], "directory_id": "14386bc6bfa3edb5240cee6e0abe983660f6f4b5", "extension": "py", "fi...
2.390625
stackv2
import os import uuid import zipfile from flask import Flask, request, render_template, jsonify, redirect, url_for from constants import DEFAULT_ERROR_MESSAGE from utils import get_parsed_file, empty_directory app = Flask(__name__) IS_PROD = os.environ.get("IS_PROD", False) def allowed_file(filename): allowed_...
93
29.33
106
17
605
python
[{"finding_id": "codeql_py/stack-trace-exposure_7a051d542248dde3_c3f0af5a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-022", "CWE-022" ]
[ "py/stack-trace-exposure", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 70, 41, 46 ]
[ null, null, null ]
[ 20, 19, 23 ]
[ 28, 31, 35 ]
2024-11-18T20:39:41.026490+00:00
1,629,388,914,000
28d5bbcb8bd10860d0b4e7073a17616e4db29463
3
{ "blob_id": "28d5bbcb8bd10860d0b4e7073a17616e4db29463", "branch_name": "refs/heads/master", "committer_date": 1629388914000, "content_id": "ae73da620f0c3cec67649af9df410f0c9ddf647f", "detected_licenses": [ "MIT" ], "directory_id": "1408fc7fea7d92e93e97dae5f8dc154f8a53dc17", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python3 # Script to initialize database and users, from the siteconfig.json file import json import os.path import sqlite3 import hashlib import random import string siteconfig = json.load(open(os.environ.get("LEXONOMY_SITECONFIG", "siteconfig.json"), encodin...
55
38.89
116
14
536
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_706fb5fdd1cbc67b_0321fb79", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 51, 47 ]
[ null, null ]
[ 15, 29 ]
[ 93, 53 ]
2024-11-18T20:39:59.859088+00:00
1,610,520,206,000
1d252437158d06cd408539be78756df5e909ab7f
3
{ "blob_id": "1d252437158d06cd408539be78756df5e909ab7f", "branch_name": "refs/heads/master", "committer_date": 1610520206000, "content_id": "c73d7a725952303e8d3850097c8908317ac79903", "detected_licenses": [ "MIT" ], "directory_id": "13e26d0e870e32aded067bbdb70563b3bc276ea5", "extension": "py", "fi...
2.65625
stackv2
# -*- coding: utf-8 -*- # Form implementation generated from reading ui file 'Interface.ui' # # Created by: PyQt5 UI code generator 5.14.2 # # WARNING! All changes made in this file will be lost! from PyQt5 import QtCore, QtGui, QtWidgets import pyqtgraph as pg import requests from datetime import datetime alpha_v...
147
40.44
115
17
1,333
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ad320bec12c7e308_b0bcca38", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 78, 81 ]
[ null, null ]
[ 15, 15 ]
[ 58, 65 ]
2024-11-18T20:52:12.516482+00:00
1,566,324,962,000
522f1d77ed9239ac4bf1e2ba5aa4d7c0604b43eb
3
{ "blob_id": "522f1d77ed9239ac4bf1e2ba5aa4d7c0604b43eb", "branch_name": "refs/heads/master", "committer_date": 1566324962000, "content_id": "531999fc3c153faaa6bd6fe70d704e56918069ac", "detected_licenses": [ "MIT" ], "directory_id": "39b197b6c6b8c594b6e3313c818d2d29dbe11413", "extension": "py", "fi...
2.734375
stackv2
import aiohttp import aiofiles import asyncio import os async def download_html(session: aiohttp.ClientSession, url: str): # Get http async with session.get(url, ssl=False) as res: filename = f'output/{os.path.basename(url)}.html' # Async write to file, using url as filename async with...
56
22.77
66
16
320
python
[{"finding_id": "codeql_py/request-without-cert-validation_ff615973785ca9b4_bcf625fc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 9 ]
[ null ]
[ 16 ]
[ 43 ]
2024-11-18T20:52:18.923227+00:00
1,637,373,938,000
8b883e0155a415328cba1353357bac0f7a3ca102
3
{ "blob_id": "8b883e0155a415328cba1353357bac0f7a3ca102", "branch_name": "refs/heads/master", "committer_date": 1637373938000, "content_id": "b9ec889c3f3a1ed171a606712df98add2f25cbd3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6ee06ad2bbc15cc0f829f99198947ffe8cffe395", "extension": "py"...
2.765625
stackv2
# -*- coding:utf-8 -*- import os import json import requests import threading from ..randheader.randheader import get_ua STATUS_CODES = [200, 206, 401, 305, 407] # HTTP响应状态码,判断认为存在风险链接的状态码 RESULT = [] THREADMAX = threading.BoundedSemaphore(32) # 限制线程的最大数量为32个 def get_html(url=''): """ 判断URL访问是否...
86
23.53
109
15
588
python
[{"finding_id": "codeql_py/request-without-cert-validation_04aaee6ca857a2ed_99781bff", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 35 ]
[ null ]
[ 24 ]
[ 107 ]
2024-11-18T21:08:09.565972+00:00
1,646,696,264,000
5e888f3581b308cf6a271fa03a980dba907bd298
2
{ "blob_id": "5e888f3581b308cf6a271fa03a980dba907bd298", "branch_name": "refs/heads/master", "committer_date": 1646696264000, "content_id": "f7af14d1c97fd868a5c267d974be586b812342ac", "detected_licenses": [ "MIT" ], "directory_id": "19a1a1077cab71e48b8a04482d790bd20b17037e", "extension": "py", "fi...
2.421875
stackv2
import json from importlib import import_module import six from django.conf import settings from django.core.exceptions import ImproperlyConfigured from rest_framework import serializers from task_api.models import TaskInfo from task_api.params import ParameterNotValidError BACKGROUND_TASKS = getattr(settings, 'TASK...
72
37.1
120
18
544
python
[{"finding_id": "codeql_py/stack-trace-exposure_bf5e3e519a50f141_aedf0432", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 67 ]
[ null ]
[ 51 ]
[ 110 ]
2024-11-18T21:08:17.488880+00:00
1,595,650,634,000
a30cfbe9a009c9c04bd8c6833aec8fed21d1a1b5
3
{ "blob_id": "a30cfbe9a009c9c04bd8c6833aec8fed21d1a1b5", "branch_name": "refs/heads/master", "committer_date": 1595650634000, "content_id": "c32e4e827a293348a058cb2ecae6939822b564d3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bc7387a0892f441918f6ee4f861060d1619ad808", "extension": "py"...
2.546875
stackv2
#!/usr/bin/python3 # Inspired by: # - https://github.com/sagaragarwal94/python_rest_flask/blob/master/server.py # - https://www.codementor.io/sagaragarwal94/building-a-basic-restful-api-in-python-58k02xsiq # - https://blog.miguelgrinberg.com/post/designing-a-restful-api-with-python-and-flask from flask import F...
124
35.29
112
19
1,065
python
[{"finding_id": "codeql_py/sql-injection_95df07c9eb05df45_8f805c12", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 90 ]
[ 95 ]
[ 30 ]
[ 36 ]
2024-11-18T21:08:19.251189+00:00
1,592,926,118,000
371b41f5eb84ee0b2e8154a57d81df929f310220
2
{ "blob_id": "371b41f5eb84ee0b2e8154a57d81df929f310220", "branch_name": "refs/heads/master", "committer_date": 1592926118000, "content_id": "8dfc125eefe08735fc7cff613ddc162c492c9666", "detected_licenses": [ "Apache-2.0" ], "directory_id": "afdabf47805d81586e1f7e507437fac3a5fbbe5c", "extension": "py"...
2.40625
stackv2
from bcrypt import checkpw from flask import jsonify, render_template, redirect, request, url_for, flash from flask_login import current_user, login_required, login_user, logout_user from app import db, login_manager from app.base.models import User from app.users import blueprint from app.users.utils import save_pic...
122
31.24
100
17
837
python
[{"finding_id": "codeql_py/url-redirection_e8a7d2e28b8fe18c_7aefeb15", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-18T21:08:23.400605+00:00
1,549,457,205,000
a11ecefc3094b718e36a81a8fc2ff641395c9e6c
3
{ "blob_id": "a11ecefc3094b718e36a81a8fc2ff641395c9e6c", "branch_name": "refs/heads/master", "committer_date": 1549457205000, "content_id": "fcc0a5522da8201e5973bda162b74b3be674a90e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e70b71ca8cb2c651182bc110d5b68249a15a8c93", "extension": "py"...
2.765625
stackv2
from .._display import session_line # TODO: document def extract(filepath, verbose=True): import bz2 import tarfile import os with session_line("Extracting {}... ".format(filepath), disable=not verbose): try: tar = tarfile.open(filepath) tar.extractall() f...
34
23.09
81
16
171
python
[{"finding_id": "codeql_py/tarslip_09506a3ba7f6f574_c3d44cda", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 14 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T21:31:32.344660+00:00
1,634,027,184,000
09217f29e1854cc8e616919b9d0add6676f4558f
3
{ "blob_id": "09217f29e1854cc8e616919b9d0add6676f4558f", "branch_name": "refs/heads/master", "committer_date": 1634027184000, "content_id": "5f4ed6919394663ddab1e36dd4910442e268fd89", "detected_licenses": [ "MIT" ], "directory_id": "b9bc4a0bfbd61499583debd27e00aa0e2cb50c94", "extension": "py", "fi...
3.34375
stackv2
################################################ # The vocalAssistant python module defines the # vocal assistant for the imtreat python package ################################################ import pyttsx3 # Specified class to define the vocal assistance class vocalAssistantClass: # Initialize a vocalAssistantCl...
76
24.87
78
13
471
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b2210aa01c11cf0e_769c0408", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 54 ]
[ null ]
[ 10 ]
[ 40 ]
2024-11-18T21:31:59.110535+00:00
1,482,353,276,000
e04d8d167ae89b244867a833f18f03394db13a04
3
{ "blob_id": "e04d8d167ae89b244867a833f18f03394db13a04", "branch_name": "refs/heads/master", "committer_date": 1482353276000, "content_id": "68f4d2a45062c3b629ef38ad0718c37ef6451a09", "detected_licenses": [ "MIT" ], "directory_id": "01b3c74df48671032fa0fe403224304832ee7be6", "extension": "py", "fi...
2.546875
stackv2
from flask import render_template, redirect, url_for, request, abort from urllib.parse import urlparse, urljoin from imp_flask.blueprints import home_index from imp_flask.forms.login import Login from imp_flask.core.auth import do_login, do_logout from imp_flask.core import flash # See http://flask.pocoo.org/snippet...
43
33.67
115
16
330
python
[{"finding_id": "codeql_py/url-redirection_a5a8ddb367d8e63f_ed6c165d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 34 ]
[ null ]
[ 29 ]
[ 59 ]
2024-11-18T21:33:01.274457+00:00
1,581,027,314,000
be431e112c09388931411e5a556643530bc54a2f
3
{ "blob_id": "be431e112c09388931411e5a556643530bc54a2f", "branch_name": "refs/heads/master", "committer_date": 1581027573000, "content_id": "515b472a088aa7c812216abdea0c44ce3bcd8adc", "detected_licenses": [ "MIT" ], "directory_id": "f4bce8a845723044857d3f0f0699eef66d540d64", "extension": "py", "fi...
3
stackv2
""" Common utilities. """ from os.path import basename, normpath import pathlib from shutil import copyfileobj from urllib.error import HTTPError from urllib.request import urlopen import zipfile import tarfile from sklearn.datasets import get_data_home def fetch_file(dataname, urlname, subfolder=None, data_home=Non...
164
27.3
77
15
989
python
[{"finding_id": "codeql_py/tarslip_843faced7c15852a_036afa3f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 101 ]
[ null ]
[ 13 ]
[ 28 ]
2024-11-18T21:33:06.918694+00:00
1,602,441,241,000
a410cbf27e60ff58c79f63a678037aec0c008739
3
{ "blob_id": "a410cbf27e60ff58c79f63a678037aec0c008739", "branch_name": "refs/heads/main", "committer_date": 1602441241000, "content_id": "0df14b6b0ee435701e49d0c5778329cbc020eafc", "detected_licenses": [ "MIT" ], "directory_id": "7be8d70e493e50424a08fb7851c91980177ec6ef", "extension": "py", "file...
2.84375
stackv2
import nltk from nltk.corpus import stopwords from nltk.cluster.util import cosine_distance from nltk import sent_tokenize from nltk import word_tokenize from nltk.corpus import words import numpy as np import networkx as nx from collections import Counter import re def deEmojify(text): regrex_pattern = re.compile...
125
36.29
83
13
1,107
python
[{"finding_id": "codeql_py/overly-large-range_2d6d4269897f4f0d_25389883", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class." ]
[ 14, 14, 14 ]
[ null, null, null ]
[ 35, 38, 41 ]
[ 39, 42, 45 ]
2024-11-18T22:26:06.552571+00:00
1,603,994,673,000
a94265b332b4f15e06461e9d9318859eaee506a5
2
{ "blob_id": "a94265b332b4f15e06461e9d9318859eaee506a5", "branch_name": "refs/heads/master", "committer_date": 1603994673000, "content_id": "aaf6833bccc77143b54950e732fcc21a373768c0", "detected_licenses": [ "MIT" ], "directory_id": "e923d2e6177718ca6d23d419c954e119a9236f84", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python3 # Utility to set the home position # Date Who Description # ============================================================================= # 09/29/20 NH Initial commit, fixed args from pymavlink import mavutil import datetime as dt import argparse import time import serial import pynmea2 impo...
78
31.42
174
16
766
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_624726987903e01f_f0f670a2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 46 ]
[ null ]
[ 8 ]
[ 22 ]
2024-11-18T22:42:08.982535+00:00
1,346,799,942,000
937fd1735662f339c25129c041d134f5bf1ce8b4
3
{ "blob_id": "937fd1735662f339c25129c041d134f5bf1ce8b4", "branch_name": "refs/heads/master", "committer_date": 1346799942000, "content_id": "6b74501d78c1933c268ed1ae796c7a5e9e53b5c2", "detected_licenses": [ "MIT" ], "directory_id": "a73c128361b37300259c131dfd3e063ccd6f1e31", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/python import sys import paramiko from datetime import date from optparse import OptionParser MONTHLY_CAP = float(250000) DAILY_CAP = MONTHLY_CAP/30 def get_ssh_conn(): key = paramiko.RSAKey.from_private_key_file('/var/lib/nagios/.ssh/id_rsa') ssh=paramiko.SSHClient() ssh.set_missing_host_key_...
113
34.24
109
14
1,191
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_69497255418f70d0_04de0333", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 14 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-18T22:42:10.910682+00:00
1,619,299,319,000
f53e3119d2508b1da4248ccc6cdcf5a2bcf10e6f
3
{ "blob_id": "f53e3119d2508b1da4248ccc6cdcf5a2bcf10e6f", "branch_name": "refs/heads/master", "committer_date": 1619299319000, "content_id": "794cf44882962f9234b2b0838423c7435a230281", "detected_licenses": [ "MIT" ], "directory_id": "e9e4b6eee59db271aa3c0ba23ce3d1517f370565", "extension": "py", "fi...
2.671875
stackv2
import praw, pickle from requests_html import HTMLSession from psaw import PushshiftAPI class Crawler: def __init__(self, cid, sec, user, pwd, uage): """ A crawler object based on the praw Reddit class. """ self.reddit = praw.Reddit(client_id= cid, ...
117
36.6
130
18
902
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_81285d37be89f91b_a8714083", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://imgur.com](1) may be at an arbitrary position i...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [http://imgur.com](1) may be at an arbitrary position in the sanitized URL.", "The string [https://imgur.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 40, 40 ]
[ null, null ]
[ 12, 56 ]
[ 52, 97 ]