added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T20:06:10.723945+00:00
1,668,635,430,000
9f1e98a7f14438cca0dbdbb1f5035908433312e1
3
{ "blob_id": "9f1e98a7f14438cca0dbdbb1f5035908433312e1", "branch_name": "refs/heads/master", "committer_date": 1668635430000, "content_id": "5047c38b8ef8fcceeeb98f2aea6934bb7234c053", "detected_licenses": [ "MIT" ], "directory_id": "c808eb66af2c5b3a269d8cf42ef7a987bbbfd216", "extension": "py", "fi...
2.6875
stackv2
from flask import Flask, request import os from transformers import ( RobertaForSequenceClassification, RobertaForMaskedLM, RobertaTokenizer, ) import torch import nltk from nltk.tokenize.treebank import TreebankWordDetokenizer import json import re def replace_query_token(sentence): "Small utility fu...
237
34.71
122
24
1,712
python
[{"finding_id": "codeql_py/reflective-xss_e4b2902216775fc3_cdce23cc", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 145, 182, 235 ]
[ null, null, null ]
[ 20, 24, 24 ]
[ 40, 44, 44 ]
2024-11-18T20:06:13.396944+00:00
1,573,983,463,000
97e5f2a82c095d24fcabda17596e3b308495392e
3
{ "blob_id": "97e5f2a82c095d24fcabda17596e3b308495392e", "branch_name": "refs/heads/master", "committer_date": 1573983463000, "content_id": "3d9fee0e91b0ba3a8505ba68f5267bf83a5caa21", "detected_licenses": [ "MIT" ], "directory_id": "e0177aa8facbcf17860189f3f9820c42d4aa2837", "extension": "py", "fi...
2.640625
stackv2
''' @Author: your name @Date: 2019-11-17 15:35:21 @LastEditTime: 2019-11-17 15:46:42 @LastEditors: Please set LastEditors @Description: In User Settings Edit @FilePath: /tornado_study/chapter1/hello.py ''' import tornado.httpserver import tornado.ioloop import tornado.options import tornado.web from tornado.options imp...
33
25.52
68
12
243
python
[{"finding_id": "codeql_py/reflective-xss_ce6653acd07e8852_7111e9f3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 20 ]
[ 49 ]
2024-11-18T20:06:27.566138+00:00
1,486,049,299,000
ecfa8faab1927c6cb44f532578edcaedf7c3fe5d
2
{ "blob_id": "ecfa8faab1927c6cb44f532578edcaedf7c3fe5d", "branch_name": "refs/heads/master", "committer_date": 1486049299000, "content_id": "6efcba773e0518262106387795f49558f8ceb7cd", "detected_licenses": [ "MIT" ], "directory_id": "f75959985a7445180b76f664c76dc9f960f47b6d", "extension": "py", "fi...
2.390625
stackv2
import click import os import smtplib from certidude.user import User from markdown import markdown from jinja2 import Environment, PackageLoader from email.mime.multipart import MIMEMultipart from email.mime.text import MIMEText from email.mime.base import MIMEBase from urlparse import urlparse env = Environment(loa...
96
27.68
101
14
631
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1778cef8386248b9_1061c889", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 7 ]
[ 71 ]
2024-11-18T20:18:15.449469+00:00
1,618,304,658,000
34d27d5a4e193d88f58819ebde2dba712a4c4d4f
2
{ "blob_id": "34d27d5a4e193d88f58819ebde2dba712a4c4d4f", "branch_name": "refs/heads/master", "committer_date": 1618304658000, "content_id": "11ac47aabb5362658a8b6a3bd2df7059ee85ce1e", "detected_licenses": [ "MIT" ], "directory_id": "427c454142bae26ff67c73d3653fbdb16416904a", "extension": "py", "fi...
2.328125
stackv2
import config import json from PIL import Image from flask import Flask, request, make_response, render_template from flask import redirect, url_for, jsonify from src.object_detection import ObjDetectNet from src.face_recognition import FaceRecogniser app = Flask(__name__) obj_det_net = ObjDetectNet() obj_det_net.ini...
60
31.67
81
18
410
python
[{"finding_id": "codeql_py/stack-trace-exposure_74822312ec0061e6_a923e595", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 56 ]
[ null ]
[ 28 ]
[ 53 ]
2024-11-18T20:18:18.464058+00:00
1,491,795,874,000
ea1f5e24625e2851740b4857a1ddc505d181bfc3
3
{ "blob_id": "ea1f5e24625e2851740b4857a1ddc505d181bfc3", "branch_name": "refs/heads/master", "committer_date": 1511121486000, "content_id": "a5f562a04a15df5d219ae891c4fe040aff1a6c9c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f44a4cc5fe5ddda3f622605a4f37c04a9bb5b775", "extension": "py"...
2.53125
stackv2
#!/usr/bin/env python # GPX from google maps route: http://www.gpsvisualizer.com/convert_input # Or export directly from http://map.project-osrm.org ### stdlib packages import os import socket import argparse import sys import select import time import threading import thread ### external deps try: import dateuti...
300
31.1
114
18
2,159
python
[{"finding_id": "codeql_py/path-injection_ba1468e1310c6485_0c0ee59a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)." ]
[ 202, 210 ]
[ null, null ]
[ 39, 27 ]
[ 49, 37 ]
2024-11-18T20:18:20.858749+00:00
1,662,411,010,000
1ea06a23f9bde6337cddad204c99085e6422c3ad
3
{ "blob_id": "1ea06a23f9bde6337cddad204c99085e6422c3ad", "branch_name": "refs/heads/master", "committer_date": 1662411010000, "content_id": "97e7b5a07c087532df9bc83759e7cb7f60bd01d2", "detected_licenses": [ "MIT" ], "directory_id": "cf689b536bac0b58d104e48bf0e8b1d34450ff13", "extension": "py", "fi...
2.84375
stackv2
import logging import requests from leexportpy.service import Service LOGGER = logging.getLogger(__name__) class DummyService(Service): """ En example service class to show how to provide a new service support. """ def __init__(self, response, api_key, destination_config): """ Initi...
41
26.44
81
11
236
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_902daa4ea3b903bb_ad0c2c7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 32 ]
[ null ]
[ 47 ]
[ 59 ]
2024-11-18T20:31:18.790541+00:00
1,643,198,260,000
c684a40761cbb314c992f5ea4cf97c25e5c2a400
3
{ "blob_id": "c684a40761cbb314c992f5ea4cf97c25e5c2a400", "branch_name": "refs/heads/master", "committer_date": 1643198260000, "content_id": "38f7b4091610bfb0a0638a4d17457811b30d0a88", "detected_licenses": [ "MIT" ], "directory_id": "4d6c87d239681c55d0119219c30296ed611ad5d4", "extension": "py", "fi...
3.28125
stackv2
""" Connection functions """ import sqlite3 import hashlib from flask import session def logged_in(): return session.get('logged_in') def log_in(): session['logged_in'] = True def logout(): session['logged_in'] = False def validate(username, password): con = sqlite3.connect("User.db") compl...
34
22
77
14
168
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_173c4bf54e084f8e_3914d975", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 34 ]
[ null ]
[ 43 ]
[ 65 ]
2024-11-18T20:31:20.337190+00:00
1,631,715,293,000
987d3904f9faf77e5f70e43c778a4d55ab9598a6
2
{ "blob_id": "987d3904f9faf77e5f70e43c778a4d55ab9598a6", "branch_name": "refs/heads/main", "committer_date": 1631715293000, "content_id": "1a3bce54903aafaa696315dcc2bdce756bacefde", "detected_licenses": [ "MIT" ], "directory_id": "26f976ad9de2009f980bc13dc9bfc3ef10873dcc", "extension": "py", "file...
2.3125
stackv2
import streamlit as st import urllib3 import numpy as np from PIL import Image import cv2 import requests import socket #================================ # Message Headers #================================= COMMAND_START=bytes("<command>",'utf-8') COMMAND_END=bytes("</command>","utf-8") IMAGE_START=bytes("<image>",...
120
32.72
132
15
1,034
python
[{"finding_id": "codeql_py/full-ssrf_c70a3b1fb32ccdf1_597c9d3b", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 100 ]
[ null ]
[ 20 ]
[ 50 ]
2024-11-18T20:31:22.478914+00:00
1,570,124,937,000
3d173d8be25587204988147f4f977b07f815e309
3
{ "blob_id": "3d173d8be25587204988147f4f977b07f815e309", "branch_name": "refs/heads/master", "committer_date": 1570124936000, "content_id": "1833a83f645e439c430db6106ebc21f806da9339", "detected_licenses": [ "MIT" ], "directory_id": "dd7039f4a2ac02101f1cbe76bc3e35d23ad45f1f", "extension": "py", "fi...
2.84375
stackv2
# -*- coding: UTF-8 -*- import re # From: # http://stackoverflow.com/a/33417311/735926 # http://jrgraphix.net/r/Unicode/2600-26FF # https://en.wikipedia.org/wiki/Enclosed_Alphanumeric_Supplement # https://en.wikipedia.org/wiki/CJK_Symbols_and_Punctuation # https://en.wikipedia.org/wiki/Miscellaneous_Technic...
129
27.75
77
14
1,340
python
[{"finding_id": "codeql_py/overly-large-range_e864ed9b7ee65734_57f9f9b3", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
5
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 14, 14, 14, 14, 14 ]
[ null, null, null, null, null ]
[ 6, 9, 12, 15, 18 ]
[ 10, 13, 16, 19, 22 ]
2024-11-18T20:43:25.382016+00:00
1,472,661,761,000
73876c1cc0526ec4fb317904bd408286e5ecf756
3
{ "blob_id": "73876c1cc0526ec4fb317904bd408286e5ecf756", "branch_name": "refs/heads/master", "committer_date": 1472661761000, "content_id": "b83a5f79b09228f0c533d6a81785cae960c63644", "detected_licenses": [ "MIT" ], "directory_id": "cef83c75099225056b76a42cb4fc9d413490f6b7", "extension": "py", "fi...
2.75
stackv2
from flask import Response, Flask, request, abort, render_template from flask import jsonify from datetime import datetime from flask_restful import Resource, Api from sqlalchemy import create_engine from json import dumps #Create a engine for connecting to SQLite3. #Assuming geo_example.db is in your app root folder ...
104
41.7
126
18
1,099
python
[{"finding_id": "codeql_py/flask-debug_4e501c27c38d046f_f0ff8645", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).\nThis SQL query depend...
[ 104, 52, 64, 74 ]
[ null, null, null, null ]
[ 5, 30, 30, 30 ]
[ 40, 92, 87, 126 ]
2024-11-18T20:43:47.021662+00:00
1,489,758,709,000
a03522b73769a94b8ce73f33e157082e9eb700c2
2
{ "blob_id": "a03522b73769a94b8ce73f33e157082e9eb700c2", "branch_name": "refs/heads/master", "committer_date": 1489758709000, "content_id": "2dabab8e64cdfdffb80a46c1cabfc16f1ed33288", "detected_licenses": [ "Apache-2.0" ], "directory_id": "18d81ad2843c655b1b3dd20b6915806ab85086d8", "extension": "py"...
2.5
stackv2
#!/usr/bin/python from ambariclient.client import Ambari from jinja2 import Template import argparse, json import socket parser = argparse.ArgumentParser() parser.add_argument("-v", action="store_true", default=False, dest='verbose', help="increase output verbosity") parser.add_argument("-H", action="store", dest='host...
82
39.82
147
13
784
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_829efec814cef909_a5959e8d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 51 ]
[ null ]
[ 9 ]
[ 32 ]
2024-11-18T20:43:56.337421+00:00
1,593,610,178,000
a4b137e8273276ed6099e1ebd47051725abbe599
3
{ "blob_id": "a4b137e8273276ed6099e1ebd47051725abbe599", "branch_name": "refs/heads/master", "committer_date": 1593610178000, "content_id": "084832715e4e078c8bfe45f777b7a7cf8ee997d3", "detected_licenses": [ "MIT" ], "directory_id": "504b13512f5138a7deca1ae711cd4ef7e5e4804e", "extension": "py", "fi...
2.75
stackv2
import glob import os import tarfile import matplotlib.pyplot as plt from tensorflow.keras.preprocessing.image import * from tensorflow.keras.utils import get_file DATASET_URL = 'https://datashare.is.ed.ac.uk/bitstream/handle/10283/3192/CINIC-10.tar.gz?sequence=4&isAllowed=y' DATA_NAME = 'cinic10' FILE_EXTENSION = 't...
57
31.51
112
10
466
python
[{"finding_id": "codeql_py/tarslip_82c58e3be43ff3b1_937aa12b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 22 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T20:57:37.263827+00:00
1,593,596,362,000
65f57e77bac8ad90047f954386b6e7ebd4c15054
3
{ "blob_id": "65f57e77bac8ad90047f954386b6e7ebd4c15054", "branch_name": "refs/heads/master", "committer_date": 1593596362000, "content_id": "22f7eb6c2b1988911507d97d68fe51ccece4a44e", "detected_licenses": [ "MIT", "Apache-2.0", "BSD-3-Clause" ], "directory_id": "4364462dc62973437404ff6992175f6...
3.046875
stackv2
import os import json from base64 import b64encode from Crypto.Cipher import AES from Crypto.Random import get_random_bytes import hashlib import random def aesgcmEncrypt(byte, key, nonce): mac_len = 16 cipher = AES.new(key, AES.MODE_GCM, nonce=nonce, mac_len=mac_len) ciphertext, tag = cipher.encrypt_and_...
36
34.25
83
12
359
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9e9e0ab6e5a14f72_0f1c72d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 33, 34 ]
[ null, null ]
[ 44, 42 ]
[ 56, 58 ]
2024-11-18T20:57:59.816241+00:00
1,566,484,879,000
c80b7102f8b9070a96c7bb3d71f8a38f011f0544
4
{ "blob_id": "c80b7102f8b9070a96c7bb3d71f8a38f011f0544", "branch_name": "refs/heads/master", "committer_date": 1566484879000, "content_id": "0f60cf94001deec658493e254e7a40304feb282b", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "8b68ab8567bfb36b310135a293b68b08f999e4a9", "extension": "p...
3.90625
stackv2
# Review AutomateTheBoringStuff Chapter 5 principles, test out a few things # dictionary data type create replace update delete search and transformation spam = ['cats', 'dogs', 'moose', ] bacon = ['dogs', 'moose', 'cats', ] print(spam == bacon) eggs = {'name': 'Zophie', 'species': 'cat', 'age': '8', } ham = {'specie...
100
30
98
16
979
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_36c4f70162225b13_412b54b5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 23, 30 ]
[ null, null ]
[ 15, 7 ]
[ 62, 16 ]
2024-11-18T20:58:07.710756+00:00
1,616,038,434,000
e429dc546928bbdaf79b3da1e4774762acc03ded
3
{ "blob_id": "e429dc546928bbdaf79b3da1e4774762acc03ded", "branch_name": "refs/heads/main", "committer_date": 1616038434000, "content_id": "eeaa9bb0552385f5b2be94514e95f76bc4033bbc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "23bcc6dedab12c27e29499af8e74177f21bf2d06", "extension": "py", ...
2.84375
stackv2
import re, string import sys, os import pandas as pd from wordcloud import WordCloud import matplotlib # Importing matplotlib for it working on remote server #matplotlib.use('tkagg') import matplotlib.pyplot as plt import emoji def give_emoji_free_text(text): return emoji.get_emoji_regexp().sub(r'', text.decode('...
91
34.65
109
14
1,011
python
[{"finding_id": "codeql_py/overly-large-range_29f9a6f7e49a85c7_c28431a6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
5
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 53, 53, 53, 53, 53 ]
[ null, null, null, null, null ]
[ 30, 33, 36, 39, 45 ]
[ 34, 37, 40, 43, 49 ]
2024-11-18T20:58:19.377324+00:00
1,600,208,766,000
b73bc9a991e27ac64bda6296b6b9a4356535090f
3
{ "blob_id": "b73bc9a991e27ac64bda6296b6b9a4356535090f", "branch_name": "refs/heads/master", "committer_date": 1600208766000, "content_id": "1444c2a69f4ae5a67cb69bbbd85ac69cbd3a414e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0f58bcae13be4d9f5d1be2cbd6fc3d19a6529745", "extension": "py"...
2.515625
stackv2
# # 2020 ExpertSystem # '''Script for generating predictions for Task2 of CLEF 2018 using the acred predictor See https://github.com/clef2018-factchecking/clef2018-factchecking See also scripts/fetch-data.sh, which should download the v1.0 release and place it in the `data/evaluation/` folder. ''' import argparse im...
138
31.99
91
16
1,134
python
[{"finding_id": "codeql_py/request-without-cert-validation_a5fff7b144068d1f_a6d11377", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 108 ]
[ null ]
[ 20 ]
[ 51 ]
2024-11-18T21:11:10.749516+00:00
1,521,609,831,000
53805c15e500879aa4c1151370e55b6b8eb1b872
4
{ "blob_id": "53805c15e500879aa4c1151370e55b6b8eb1b872", "branch_name": "refs/heads/master", "committer_date": 1521609831000, "content_id": "9bbcdd5c429cc940b52ca27021acc4b81eb5ed38", "detected_licenses": [ "MIT" ], "directory_id": "e0cb098d0d14f1ededd2224a92bb0554a79cd52c", "extension": "py", "fi...
3.90625
stackv2
#Ex9_Program_Excercise class Contact: def __init__(self, name, phone_number, e_mail, addr): self.name=name self.phone_number=phone_number self.e_mail=e_mail self.addr=addr def print_info(): print("이름: ", self.name) print('연락처: ', self.phone_number) print('이메일: ', self.e_mail) print('주소: ', self.addr)...
40
16.9
54
11
229
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_70f5e5b358ca1fcf_d7f85b0e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 11, 21 ]
[ null, null ]
[ 18, 14 ]
[ 35, 26 ]
2024-11-18T19:03:20.634418+00:00
1,517,690,990,000
201f849b6290d695fdbcac633a050f5fd72daa9f
3
{ "blob_id": "201f849b6290d695fdbcac633a050f5fd72daa9f", "branch_name": "refs/heads/master", "committer_date": 1517690990000, "content_id": "a3e960f66db07f51d293d3f94672d4f626fa2461", "detected_licenses": [ "MIT" ], "directory_id": "755190f3709d1ca8c192a106e84bc3c9694115f6", "extension": "py", "fi...
2.578125
stackv2
import logging import util.web log = logging.getLogger(__name__) class Account: """ Account class responsible for account related operations. """ _login_page_url = 'https://www.ezcapechat.com/login' _login_post_url = 'https://www.ezcapechat.com/php/go/go_login.php' _html_source = u'' _n_...
90
27.49
107
17
577
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0e530fe42b18cc3b_417bcc56", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 74 ]
[ null ]
[ 23 ]
[ 56 ]
2024-11-18T19:28:39.866700+00:00
1,572,962,347,000
a450b99ecc453208b72acbe28a26fe58e29713f4
3
{ "blob_id": "a450b99ecc453208b72acbe28a26fe58e29713f4", "branch_name": "refs/heads/master", "committer_date": 1572962347000, "content_id": "38e73290a2f45d27f10b120028c27e781efe3228", "detected_licenses": [ "Unlicense" ], "directory_id": "acf9c9f3ca79e93ab785ab4e1c83f7027696d673", "extension": "py",...
2.515625
stackv2
# import the Flask class from the flask module import os from os import urandom import requests from flask import Flask, redirect, render_template, request, url_for, jsonify, session from puppeteer import PrivateIGScrapper, nsfw_api_batch_post # create the application object app = Flask(__name__) app.secret_key = uran...
61
32.82
86
16
399
python
[{"finding_id": "codeql_py/stack-trace-exposure_42933cb76548f00c_4bdf66e8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 43, 61 ]
[ null, null ]
[ 21, 5 ]
[ 27, 24 ]
2024-11-18T19:39:48.686321+00:00
1,558,962,302,000
957f6c515bc0cb376d673b74558cff4064a0a8f4
2
{ "blob_id": "957f6c515bc0cb376d673b74558cff4064a0a8f4", "branch_name": "refs/heads/master", "committer_date": 1558962302000, "content_id": "57b33cda3775ee23f8b72346f3737068f76e6757", "detected_licenses": [ "MIT" ], "directory_id": "6c1dc9c19c078272faa5077e97015732f6d7e959", "extension": "py", "fi...
2.359375
stackv2
# 从数据库查询数据 并且传给模板 import hashlib import os import uuid import flask from flask import render_template, url_for, redirect, request, make_response, session, g, current_app from flask_mail import Message from sqlalchemy import and_, or_ from werkzeug.exceptions import abort from code1.app import db, mail from code1.app....
330
28.19
144
18
2,704
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_014f9e477dcbecb5_a47137a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-079", "CWE-022" ]
[ "py/clear-text-logging-sensitive-data", "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 62, 69, 254 ]
[ null, null, null ]
[ 25, 34, 20 ]
[ 33, 92, 31 ]
2024-11-18T20:18:21.250948+00:00
1,425,067,076,000
f5d0ac1364c0aa5e175f33d649cd135bdf671009
3
{ "blob_id": "f5d0ac1364c0aa5e175f33d649cd135bdf671009", "branch_name": "refs/heads/master", "committer_date": 1425067076000, "content_id": "1bf42bbd4d9b4ba8089f36952c664fe3bffa3e0b", "detected_licenses": [ "MIT" ], "directory_id": "fdde0fa76eea56f9aac6b944a42072dd93e5d71e", "extension": "py", "fi...
2.640625
stackv2
__author__ = 'Blake' import os import re from collections import namedtuple from jinja2 import Environment as JinjaEnvironment, FileSystemLoader as JinjaLoader from synpost.globals import Values as Globals from synpost.fn.io import generic_collect ThemeFile = namedtuple('ThemeFile', 'filename valiname filepath ext...
107
37.45
130
16
921
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c62c397c343a5db4_6751e21f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 56 ]
[ null ]
[ 34 ]
[ 131 ]
2024-11-18T20:18:35.923923+00:00
1,392,418,155,000
c00c25b8fe59829a5793232529f8c9d03ec26a5b
2
{ "blob_id": "c00c25b8fe59829a5793232529f8c9d03ec26a5b", "branch_name": "refs/heads/master", "committer_date": 1392418155000, "content_id": "b012cbab800d1610c3fdc9577d031f508b6776c6", "detected_licenses": [ "MIT" ], "directory_id": "fe65f270f7b95ede81bc972fab96519348de20da", "extension": "py", "fi...
2.375
stackv2
""" Flask extension for Facebook canvas-based applications """ import hmac from base64 import urlsafe_b64decode as b64decode from hashlib import sha256 # pylint: disable=E0611 try: from simplejson import loads except ImportError: from json import loads from inspect import getargspec from urllib2 import urlopen...
143
30.05
78
22
937
python
[{"finding_id": "codeql_py/url-redirection_7247c59d30a31e1d_5e7221d5", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a ...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](1)." ]
[ 70 ]
[ 72 ]
[ 37 ]
[ 57 ]
2024-11-18T20:18:37.280324+00:00
1,514,804,002,000
d039e5fb88a0292af21b0f2c437a62d18b36abb0
3
{ "blob_id": "d039e5fb88a0292af21b0f2c437a62d18b36abb0", "branch_name": "refs/heads/master", "committer_date": 1514804002000, "content_id": "bfb7b72b8691d02fe1ec6a54a03505499a10033f", "detected_licenses": [ "MIT" ], "directory_id": "79877a672a36fe9430b652d77ea5fba86578bcab", "extension": "py", "fi...
2.75
stackv2
# Copyright (c) Amber Brown, 2015 # See LICENSE for details. from __future__ import absolute_import, division, print_function import os import textwrap from collections import OrderedDict from jinja2 import Template def normalise(text): # Blitz newlines text = text.replace(u"\r\n", u"\n") text = text...
178
25.56
79
17
1,037
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5371e12f1a592c34_77c527f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 130 ]
[ null ]
[ 22 ]
[ 58 ]
2024-11-18T20:18:46.259945+00:00
1,624,630,932,000
b655b68af92ef515cf41b64b187968b1f054d018
2
{ "blob_id": "b655b68af92ef515cf41b64b187968b1f054d018", "branch_name": "refs/heads/master", "committer_date": 1624630932000, "content_id": "effef56549eb8d28e9fa1be993769e422585c566", "detected_licenses": [ "MIT" ], "directory_id": "1bedd8572c8030af0a8981c24938ff6480ac1b57", "extension": "py", "fi...
2.34375
stackv2
import logging import os import boto3 from kfai_sql_chemistry.aws.secrets import SecretValue from kfai_sql_chemistry.db.database_config import DatabaseConfig logger = logging.getLogger(__name__) def _create_default_client(): return boto3.client("secretsmanager") class AwsDbConfig: def __init__(self, bot...
51
33.31
79
13
388
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_988badacec824dac_f1692ff6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 37, 38 ]
[ null, null ]
[ 25, 25 ]
[ 53, 54 ]
2024-11-18T20:18:46.844607+00:00
1,583,307,996,000
0c9b0a13ef4ba060cd442c5e3b68d1bdfb52fff1
3
{ "blob_id": "0c9b0a13ef4ba060cd442c5e3b68d1bdfb52fff1", "branch_name": "refs/heads/master", "committer_date": 1583307996000, "content_id": "57359d09ab2c7ff7985e70263e9b076e2693222a", "detected_licenses": [ "MIT" ], "directory_id": "639b14c6d30f963af0b86b67488ee9ead7f483ea", "extension": "py", "fi...
3.234375
stackv2
import serial import time import sys from tkinter import * from tkinter import messagebox root = Tk() root.title("PowerTech") root.geometry("480x180") titleLabel = Label(root, text = "PowerTech控制器藍牙設定程式") firstLabel = Label(root, text = "序列埠:") secondLabel = Label(root, text = "mac位址:") port = Entry(root, text = "co...
68
25.07
98
16
578
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3bbf80b1143569c4_40837875", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 39 ]
[ null ]
[ 15 ]
[ 22 ]
2024-11-18T20:29:51.892351+00:00
1,587,160,528,000
1f46a4315625b86b8640e75794b992d9c602332b
2
{ "blob_id": "1f46a4315625b86b8640e75794b992d9c602332b", "branch_name": "refs/heads/master", "committer_date": 1587160528000, "content_id": "3040d7b3994ce4130cd9444da9cfa8d75f78491d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "5af26d6288b147839f4536abf362c022f8a0984e", "extension": "p...
2.421875
stackv2
import requests import json import time import pandas as pd import matplotlib.pyplot as plt import matplotlib.gridspec as gridspec from src.results_poller import poller def reo_optimize(post): API_KEY = 'yOODa4jmZy1q3Wd6lkQcne6izi3nq2YSIIlCQkOg' root_url = 'https://developer.nrel.gov/api/reopt' post_url =...
133
37.9
113
16
1,277
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7a57ec7f273feb5_b455ceb0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19, 21 ]
[ null, null ]
[ 15, 15 ]
[ 74, 54 ]
2024-11-18T20:51:24.967253+00:00
1,392,064,368,000
c841c82772bb5c2576cb97ed8cf07724d8adc7a8
3
{ "blob_id": "c841c82772bb5c2576cb97ed8cf07724d8adc7a8", "branch_name": "refs/heads/master", "committer_date": 1392064368000, "content_id": "ae13dfd921cba8f94db4370929a3f811fbc30935", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a678e2b16da3887600700d47f6c12e7d0d0627fd", "extension": "p...
2.65625
stackv2
#!/usr/bin/python import asynchat import asyncore import socket import ssl import time from datetime import datetime HEADER = object() CHUNKED = object() CHUNK = object() BODY = object() HTTP_METHODS = set(["GET", "POST", "HEAD", "PUT", "DELETE", "OPTIONS", "TRACE", "CONNECT"]) def ensure_strin...
416
31.2
79
20
2,793
python
[{"finding_id": "codeql_py/insecure-default-protocol_b9e15554343f90a2_cfa03800", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 197 ]
[ 199 ]
[ 27 ]
[ 47 ]
2024-11-18T20:51:45.180268+00:00
1,680,032,345,000
f6e8df6c63554a259ea242a806ebed6cd5f00c5c
2
{ "blob_id": "f6e8df6c63554a259ea242a806ebed6cd5f00c5c", "branch_name": "refs/heads/main", "committer_date": 1680033272000, "content_id": "0f3cec862e5b7c25ecd23b734209763b749a9e14", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3f5f2bad9f6ab4acd56c4e2929cee1af4a242e57", "extension": "py", ...
2.390625
stackv2
# # # Copyright (c) 2022 Dell EMC Corporation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agre...
295
45.79
119
22
2,897
python
[{"finding_id": "codeql_py/request-without-cert-validation_16dce5a17e5ae20c_7b00b06d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 56, 130, 165, 183, 192 ]
[ 58, null, 166, null, null ]
[ 20, 29, 26, 16, 38 ]
[ 50, 77, 88, 68, 96 ]
2024-11-18T19:07:29.869406+00:00
1,545,355,322,000
b78b09f32c99e90420e400f1046ad0006f6d2077
2
{ "blob_id": "b78b09f32c99e90420e400f1046ad0006f6d2077", "branch_name": "refs/heads/master", "committer_date": 1545355322000, "content_id": "693df5390d565f2e498b00c7bbfe7cc8b24a9da7", "detected_licenses": [ "MIT" ], "directory_id": "50e40ed81a8e0cc6e2fed5b12836e947c0b45bd8", "extension": "py", "fi...
2.5
stackv2
# -*- coding: utf-8 -*- import json import os import re import urllib.request from bs4 import BeautifulSoup from slackclient import SlackClient from flask import Flask, request, make_response, render_template import secretKey app = Flask(__name__) sc = SlackClient(secretKey.slack_token) ERR_TEXT = "명령어가 잘못됐거나 없는 유저입...
285
31.14
119
19
2,444
python
[{"finding_id": "codeql_py/flask-debug_ac2300c905c10766_98310cb7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
7
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 285, 253, 261, 267, 68, 134, 183 ]
[ null, null, null, null, null, null, null ]
[ 5, 26, 30, 23, 26, 26, 26 ]
[ 48, 33, 54, 30, 53, 53, 53 ]
2024-11-18T19:07:46.761746+00:00
1,624,253,842,000
fb852a87a3075c1b361cf43b4b96aad5241fce12
3
{ "blob_id": "fb852a87a3075c1b361cf43b4b96aad5241fce12", "branch_name": "refs/heads/main", "committer_date": 1624253842000, "content_id": "b218576e1b2e123c0c7cc5e59cca89f49bb36da8", "detected_licenses": [ "MIT" ], "directory_id": "59d240f3f4bd4f0e1d03c8ba184923727f6d3d00", "extension": "py", "file...
2.875
stackv2
import os import json import base64 import binascii from pwdgen import generate_password from collections import defaultdict from cryptography.hazmat.primitives import hashes from cryptography.fernet import Fernet, InvalidToken from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC global fernet_key def ad...
303
40.26
124
21
2,649
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_653489ecf2f060f6_9907e636", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 21, 50, 135, 294 ]
[ null, null, null, null ]
[ 15, 31, 11, 15 ]
[ 58, 81, 107, 108 ]
2024-11-18T19:07:48.685661+00:00
1,691,737,665,000
b72551272b78b9ae7122797d43b1d56cf9589b96
3
{ "blob_id": "b72551272b78b9ae7122797d43b1d56cf9589b96", "branch_name": "refs/heads/master", "committer_date": 1691737665000, "content_id": "851504576f29a830a59e0804cf42b51f12d3b321", "detected_licenses": [ "Unlicense" ], "directory_id": "6dfc23ef65e5943712340ef2b4b648cc25ea1fad", "extension": "py",...
2.796875
stackv2
from bottle import run, get, post, request, delete animals = [{'name' : 'Ellie', 'type' : 'Elephant'}, {'name' : 'Python', 'type' : 'Snake'}, {'name' : 'Zed', 'type' : 'Zebra'}] @get('/animal') def getAll(): return {'animals' : animals} @get('/animal/<name>') def getOne(name): the_animal = [animal for animal...
28
26.89
84
12
224
python
[{"finding_id": "codeql_py/reflective-xss_854b0bc059a0c48c_dc96b037", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 20 ]
[ null ]
[ 9 ]
[ 30 ]
2024-11-18T19:07:57.135721+00:00
1,651,894,136,000
b8203197fef9aad2955b47a82749602647d3931b
3
{ "blob_id": "b8203197fef9aad2955b47a82749602647d3931b", "branch_name": "refs/heads/master", "committer_date": 1651894136000, "content_id": "2c90c75ddd48f14f7aafd7c720d0a35d79a72580", "detected_licenses": [ "MIT" ], "directory_id": "31259d24c446d86a737ac70e9911d461dbb89ff3", "extension": "py", "fi...
3.046875
stackv2
from pathlib import Path from typing import Union, List, Any from jinja2 import Environment, FileSystemLoader, Template class ConfigTemplateBuilder: def __init__(self, template_dir: str = "templates"): self._template_path = Path(template_dir) self._set_env() def _set_env(self) -> Environment...
57
32.11
97
14
406
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_387ec1f88563ee5c_dce3afed", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ 24 ]
[ 15 ]
[ 10 ]
2024-11-18T19:18:24.642363+00:00
1,471,378,878,000
8dd174dff1462bf248565e6bb942ce9d4465cfd7
3
{ "blob_id": "8dd174dff1462bf248565e6bb942ce9d4465cfd7", "branch_name": "refs/heads/master", "committer_date": 1471378878000, "content_id": "d19eb9d8385b54942e4bb5ce3ee4adacbd7c7b1c", "detected_licenses": [ "MIT" ], "directory_id": "acb9ad18ed21c0abd29ca18e7f9daad21bf4ff15", "extension": "py", "fi...
3.34375
stackv2
import sys from datetime import datetime from conf import settings from .log import Log class WorkLog: """WorkLog handles displaying and prompting. WorkLog displays menus to the terminal, waits for input from the user and makes calls to an instance of Log to perform actions on a selected Tas...
392
33.82
86
23
2,741
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d8bec2994fb67e3a_7d19a76d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 331 ]
[ null ]
[ 19 ]
[ 56 ]
2024-11-18T19:18:40.007112+00:00
1,553,531,008,000
3b874c457da1c4e2eb1f6656d83a9119a3dc914c
3
{ "blob_id": "3b874c457da1c4e2eb1f6656d83a9119a3dc914c", "branch_name": "refs/heads/master", "committer_date": 1553531008000, "content_id": "cda2942547b4f4cfc4c473ea97cd9fa86264e810", "detected_licenses": [ "MIT" ], "directory_id": "4ced5c69c9a8a1fce6321c32fb180019938b04ab", "extension": "py", "fi...
2.90625
stackv2
# -*- coding: utf-8 -*- import socket import ssl host = "127.0.0.1" port = 8880 s=socket.socket() ssl_sock = ssl.wrap_socket(s, cert_reqs=ssl.CERT_REQUIRED, ca_certs='cert.crt') print(ssl.CERT_REQUIRED) ssl_sock.connect((host,port)) while True: mensaje=input('> ') if mensaje == 'quit': break mensaje=mensaje.encode...
18
22.83
79
10
131
python
[{"finding_id": "codeql_py/insecure-default-protocol_3a1ba257efb8b281_0e7b514a", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 7 ]
[ null ]
[ 12 ]
[ 80 ]
2024-11-18T19:19:00.948583+00:00
1,605,539,012,000
e4f61acceb6e957ed7c79aed5f011a51c0e269ff
2
{ "blob_id": "e4f61acceb6e957ed7c79aed5f011a51c0e269ff", "branch_name": "refs/heads/master", "committer_date": 1605539012000, "content_id": "4109cedf24decd5d682cd05be4a2ead3dca136d9", "detected_licenses": [ "MIT" ], "directory_id": "2694b4aaf79bbaa38837aeedebad508cd98815c5", "extension": "py", "fi...
2.421875
stackv2
import pandas as pd import numpy as np import sys import os from pathlib import Path import re from gensim.models import TfidfModel, nmf from gensim.corpora import Dictionary as Dict from gensim.models.ldamulticore import LdaModel from multiprocessing import Pool from functools import partial CHUNK_SIZE = 10000 TOPIC_...
309
33.14
120
31
2,886
python
[{"finding_id": "codeql_py/overly-large-range_b3eb3f10bdb79d33_871422a7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class." ]
[ 216 ]
[ null ]
[ 81 ]
[ 84 ]
2024-11-18T19:19:19.107857+00:00
1,576,704,182,000
ba2267b2e1dba34967fb423107e4d22c9f89e81c
2
{ "blob_id": "ba2267b2e1dba34967fb423107e4d22c9f89e81c", "branch_name": "refs/heads/master", "committer_date": 1576704182000, "content_id": "3d2992b9860617187bf3f95ff1675f3dfbeaf639", "detected_licenses": [ "MIT" ], "directory_id": "f6e4417a6e756a57abeacf9857b621c603b7ce2f", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python3 from bs4 import BeautifulSoup import hashlib import json from lib.output import * from lib.request import send def scan(number): if not args.scanner == 'numverify' and not args.scanner == 'all': return -1 test('Running Numverify.com scan...') try: requestSecret = ...
81
33.2
140
14
728
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_26508f441e97e1b4_e5663f80", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 30 ]
[ null ]
[ 26 ]
[ 66 ]
2024-11-18T19:29:47.640212+00:00
1,692,227,376,000
c40e5e918cb074059da8580cc954968cc34cc3cf
2
{ "blob_id": "c40e5e918cb074059da8580cc954968cc34cc3cf", "branch_name": "refs/heads/master", "committer_date": 1692227742000, "content_id": "865aeee40ca80761bcc3d030deb9b853453607f6", "detected_licenses": [ "MIT" ], "directory_id": "865e4231a1c1467a040362dddb56024a49990219", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python # # Copyright (c) 2023, NVIDIA CORPORATION. All rights reserved. # import argparse import io import json import logging import os from http.server import HTTPServer, BaseHTTPRequestHandler from socketserver import ThreadingMixIn import requests from PIL import Image from torchvision import tr...
128
30.62
81
14
827
python
[{"finding_id": "codeql_py/partial-ssrf_c6f58357876fe3cb_66929812", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 92 ]
[ null ]
[ 24 ]
[ 61 ]
2024-11-18T19:44:16.052726+00:00
1,570,377,446,000
297a35ddc6cfb84474cf7d0d995aeb76cb17f208
3
{ "blob_id": "297a35ddc6cfb84474cf7d0d995aeb76cb17f208", "branch_name": "refs/heads/master", "committer_date": 1570377446000, "content_id": "3aa9fd7adbf2a940f61eb149ba0c5434f9e30491", "detected_licenses": [ "MIT" ], "directory_id": "ebb18d175f06a8f02d6d2fb1a303ef827a0d28c0", "extension": "py", "fi...
2.796875
stackv2
from pymongo import MongoClient from hashlib import sha256 client = MongoClient() db = client.internetofthings things = db.things users = db.users stopwords = db.stopwords def hashPass(username, password): return sha256(str(username+password).encode('utf-8')).hexdigest() def create_user(username, password): ...
70
24.86
111
14
444
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_fdfee04d6e8808be_cbca6c4c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 11 ]
[ null ]
[ 19 ]
[ 57 ]
2024-11-18T19:44:16.936071+00:00
1,576,508,015,000
061a51b2f0cdd008c675241def469ce974044c9b
3
{ "blob_id": "061a51b2f0cdd008c675241def469ce974044c9b", "branch_name": "refs/heads/master", "committer_date": 1576508015000, "content_id": "1d69a20c11f2e9beb603d6849a17b90fcc233258", "detected_licenses": [ "MIT" ], "directory_id": "42d7f4af8dbc15611901a3e2695ce04849756aa5", "extension": "py", "fi...
3.125
stackv2
'''make_features.py Loads data from ../../data/interim/<filename> data. Creates features. Saves as feather file format, with original filename stub (minus file extension). Ex: train_df.pkl --> train_df.feather. Usage: make_features.py <filename> [options] Arguments: filename <file> Filename, with exten...
154
31.38
106
16
1,354
python
[{"finding_id": "codeql_py/overly-large-range_183f88fc2601eb64_33e17347", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 100 ]
[ null ]
[ 35 ]
[ 38 ]
2024-11-18T20:23:13.877711+00:00
1,470,639,479,000
40d0a09bfb9db79983d3476c2bc71a921e7b066f
3
{ "blob_id": "40d0a09bfb9db79983d3476c2bc71a921e7b066f", "branch_name": "refs/heads/master", "committer_date": 1470639479000, "content_id": "e284e1d9a7dd3fccc5c061b440c87517b749bb52", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8df95f7d9201f422a3b807084617956501b3e45d", "extension": "p...
2.59375
stackv2
from flask import Flask from flask import request app = Flask(__name__) html='''<!DOCTYPE html><html> <head> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.3/jquery.min.js"></script> <script> $(document).ready(function() { setInterval("ajaxd()",1000); }); function ajaxd() { $.ajax({ type: "...
80
24.9
89
13
600
python
[{"finding_id": "codeql_py/flask-debug_da6e5e6f5175c795_5b4c085b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 80, 74, 78 ]
[ null, null, null ]
[ 2, 9, 9 ]
[ 47, 40, 13 ]
2024-11-18T20:49:16.147317+00:00
1,583,419,519,000
1d07cc55160225a9d26f058a0c2b009e5bf6f9e8
3
{ "blob_id": "1d07cc55160225a9d26f058a0c2b009e5bf6f9e8", "branch_name": "refs/heads/master", "committer_date": 1583419519000, "content_id": "83e4518ddc5b98d17c513f2c77e394f1029c8e07", "detected_licenses": [ "MIT" ], "directory_id": "fb228bb8b3d687d25d86ecdfe2dd0052debffe47", "extension": "py", "fi...
2.625
stackv2
"""ptt crawler etl""" import codecs import requests from bs4 import BeautifulSoup import time import re import json from src.system.config_setting import ConfigSetting class PttArticleParser: """Ptt article parser""" def __init__(self, link, article_id, board, timeout=3): config_setting = ConfigSet...
97
39.15
118
17
961
python
[{"finding_id": "codeql_py/overly-large-range_4201fff4b1e40afd_1278f0bf", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class, and is equivalent to \\[\...
2
true
[ "CWE-020", "CWE-295" ]
[ "py/overly-large-range", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class, and is equivalent to \\[\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 77, 42 ]
[ null, 43 ]
[ 37, 21 ]
[ 40, 81 ]
2024-11-18T20:49:23.688016+00:00
1,549,988,581,000
5b54480563fc8f5771f4a16c4c0c7b3ce48945e2
3
{ "blob_id": "5b54480563fc8f5771f4a16c4c0c7b3ce48945e2", "branch_name": "refs/heads/master", "committer_date": 1549988581000, "content_id": "1ec7624ecad7142183c750c5798d7c47638e7554", "detected_licenses": [ "MIT" ], "directory_id": "ac7f0c9a619d0f5ad2293c27eb420a16a7b0cd13", "extension": "py", "fi...
2.8125
stackv2
#!/usr/bin/env python3 import sys from telegram.ext import Updater, CommandHandler, MessageHandler, Filters, ConversationHandler, RegexHandler from telegram import ReplyKeyboardMarkup, ReplyKeyboardRemove, ParseMode import requests import logging logging.basicConfig(level=logging.INFO, format='%(a...
111
30.25
108
17
849
python
[{"finding_id": "codeql_py/request-without-cert-validation_21a77b329af29bca_b277100b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 54 ]
[ null ]
[ 12 ]
[ 83 ]
2024-11-18T20:49:30.262345+00:00
1,581,391,742,000
913de704bd4d084dd7ce5cd24038c3a81d5550df
3
{ "blob_id": "913de704bd4d084dd7ce5cd24038c3a81d5550df", "branch_name": "refs/heads/master", "committer_date": 1581391742000, "content_id": "93258a63d696231f60ae97f55a3d5ec459ba39ab", "detected_licenses": [ "MIT" ], "directory_id": "ab3cc60352ec8a5fe9fd316555a10c846b81c6ed", "extension": "py", "fi...
2.578125
stackv2
import time import os, sys, subprocess as sp, json, datetime from os.path import * from functools import * ''' set ErrorCode 0 : No Error 1 : Over 255 chars of filename [ Project ] 2 : Empty Folder [ Sources ] 3 : Too much big file 4 : Empty Source file https://docs.microsoft.com/ko-kr/windows/desktop/Fi...
220
34.77
108
21
2,022
python
[{"finding_id": "codeql_py/overly-permissive-file_4df83c880da2e1ad_fa4622f2", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 115, 209 ]
[ null, null ]
[ 13, 9 ]
[ 37, 38 ]
2024-11-18T20:50:37.881681+00:00
1,366,998,932,000
548b4c9a0a972955289d9e9a6aeae7957ab086c1
3
{ "blob_id": "548b4c9a0a972955289d9e9a6aeae7957ab086c1", "branch_name": "refs/heads/master", "committer_date": 1366998932000, "content_id": "b1163245f7c8722d4fcd26319db6d0e1d3aca76f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "71f9f87f72431588f3fdee817e343876392be9b1", "extension": "py"...
2.609375
stackv2
# -*- coding: utf-8 -*- """ The generator creating the output HTML APACHE LICENSE 2.0 Copyright 2013 Sebastian Dahlgren Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/lic...
128
34.26
83
19
893
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_92ed4343b8da118a_b4e5334a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 35, 96 ]
[ 37, 98 ]
[ 11, 11 ]
[ 67, 67 ]
2024-11-18T20:50:45.950204+00:00
1,599,252,906,000
948f9ebe7e8e0a5a8e441d3e34474a3ab09ab1e7
2
{ "blob_id": "948f9ebe7e8e0a5a8e441d3e34474a3ab09ab1e7", "branch_name": "refs/heads/master", "committer_date": 1599252906000, "content_id": "09f78e33322788db5d3ac8ba978b359adf440e62", "detected_licenses": [ "MIT" ], "directory_id": "ffe2edee7e4d3e695a6f3a8b0c8ace325021ad64", "extension": "py", "fi...
2.34375
stackv2
import json import logging import bottle from spec_server import SpecServer, HttpVerb LOGGER = logging.getLogger('mokapi.server') app = bottle.Bottle() spec_server = None @app.route('/<uri:re:.*>', method=[v.value.upper() for v in HttpVerb]) def mock_api_router(uri): if not spec_server: LOGGER.error('Spec S...
69
26.17
90
18
493
python
[{"finding_id": "codeql_py/log-injection_abffae5ff690c16b_31455303", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 70 ]
[ 73 ]
2024-11-18T20:50:54.607472+00:00
1,689,092,738,000
8c835e3bd665e68963f3b52f558de759efdd26b6
3
{ "blob_id": "8c835e3bd665e68963f3b52f558de759efdd26b6", "branch_name": "refs/heads/master", "committer_date": 1689092738000, "content_id": "dd232c035d6d87aae9fccc35c238bc28688d38db", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "80fd32cb735bfd288c4fb9be1280146f5cf15210", "extension": "p...
2.5625
stackv2
# Downloading mdbtools import platform import os import tarfile from urllib.request import urlretrieve import sys current_dir = os.path.realpath(os.path.dirname(__file__)) tar_file_name = os.path.join(current_dir, "mdbtools.tar.gz") mdb_dir = os.path.join(current_dir, "mdbtools") if platform.system() == "Windows": ...
42
35.76
97
16
333
python
[{"finding_id": "codeql_py/tarslip_174707ca9197cf0b_3282857f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 39 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T20:51:09.111835+00:00
1,693,200,041,000
b61f20cf1415ecd0418347e57661f2cddc81f5af
2
{ "blob_id": "b61f20cf1415ecd0418347e57661f2cddc81f5af", "branch_name": "refs/heads/master", "committer_date": 1693200041000, "content_id": "49c196640fbbc58a97e43a22990c3c813b673676", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1040b320168c49e3fd784d93ff30923527582d26", "extension": "py"...
2.3125
stackv2
import os import configparser from jinja2 import Environment, PackageLoader from .schema import validate_config from .init_config import get_init_config_handle from calm.dsl.tools import make_file_dir from calm.dsl.log import get_logging_handle LOG = get_logging_handle(__name__) class ConfigFileParser: def __in...
313
26.52
123
19
1,642
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2eacd673f55bda36_c0c3d59e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 202 ]
[ null ]
[ 15 ]
[ 41 ]
2024-11-18T20:51:14.026292+00:00
1,599,660,655,000
50f41120b0a292a36de1a084c695b20422734023
3
{ "blob_id": "50f41120b0a292a36de1a084c695b20422734023", "branch_name": "refs/heads/master", "committer_date": 1599660655000, "content_id": "5acff04029965b2defb357eeffc44067644a3fd4", "detected_licenses": [ "MIT" ], "directory_id": "66d1f76e9657b773dce231926c8eb3c98be314cd", "extension": "py", "fi...
3.28125
stackv2
#!/usr/bin/env python3.8 from user import User from credentials import Credentials import pyperclip login_status = False ''' the login status of any account which will change when user successfully logs in ''' authentic_username = False ''' global variable to check if the user's enteredepassword is authentic ''' s...
201
32
116
20
1,102
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_29f43d2362fb62cc_705a377b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 171 ]
[ null ]
[ 27 ]
[ 98 ]
2024-11-18T21:13:57.104688+00:00
1,534,341,308,000
72cac8bb16fefa241b0501d73ef4f93b8b9ed21a
3
{ "blob_id": "72cac8bb16fefa241b0501d73ef4f93b8b9ed21a", "branch_name": "refs/heads/master", "committer_date": 1534341308000, "content_id": "2301f6ee96d8c81d85345a1ba7e0380d6fa74d7c", "detected_licenses": [ "MIT" ], "directory_id": "0e1038926ac062ae57da324adc169da046808479", "extension": "py", "fi...
3.09375
stackv2
import turtle import random t = turtle.clone() words = ('entrepreneurship','meet','nature','global warming','animals','recycle','tree','plastic', ' pollution') underscore_position = [] #user_word_input = input('enter a letter') #user_input = input() t.penup() t.goto(-400,0) #functions here #secret_word chooses a ran...
159
21.07
112
14
961
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_605397f99d5a29d0_466bbffd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 117, 16 ]
[ null, null ]
[ 19, 7 ]
[ 45, 18 ]
2024-11-18T21:13:58.978526+00:00
1,600,200,985,000
2b3f48d612d0147329c5ecd86057f37a67928dc2
2
{ "blob_id": "2b3f48d612d0147329c5ecd86057f37a67928dc2", "branch_name": "refs/heads/master", "committer_date": 1600200985000, "content_id": "0c3e0a117c3d44afb0d438759e8d26a25c71ff34", "detected_licenses": [ "MIT" ], "directory_id": "e26ad1f7e456154c10f7958ef4f544af45ccee6b", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- from flask import Flask, render_template, Response, send_file, request from src.summarizer import summarize_transcript from src.entity_analysis_gcp import extract_text_entity from src.slide_change_gcp import video_to_transcript_cuts DEVELOPMENT_ENV = True app = Flask(__...
83
35.81
113
22
654
python
[{"finding_id": "codeql_py/stack-trace-exposure_5ab4335e7be31b32_9c98a403", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 78, 82 ]
[ null, null ]
[ 16, 5 ]
[ 22, 35 ]
2024-11-18T21:14:11.489642+00:00
1,601,556,512,000
e8c7a6c5ed1d4459ddb7145cc3bb1e84cd19dafa
2
{ "blob_id": "e8c7a6c5ed1d4459ddb7145cc3bb1e84cd19dafa", "branch_name": "refs/heads/master", "committer_date": 1601556512000, "content_id": "576ecefb58eb3587a8cf2d6cc01b309261eebfc3", "detected_licenses": [ "MIT" ], "directory_id": "c99078fcc67c45f41f49d869685f78a85cf0f244", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, request, render_template import json import time import _thread import fasttext import jieba import gensim import analyzer import html_generator app=Flask(__name__) app.jinja_env.auto_reload=True app.config['TEMPLATES_AUTO_RELOAD']=True fasttext_model_path='./train_model/fasttext_ftz_model....
122
24.64
85
14
942
python
[{"finding_id": "codeql_py/reflective-xss_831be92abac4c446_8b48eff9", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 71 ]
[ null ]
[ 10 ]
[ 16 ]
2024-11-18T21:14:33.435845+00:00
1,617,842,110,000
e6a429ff5b9fa530fc3c9338c1a22fa8f68e862e
3
{ "blob_id": "e6a429ff5b9fa530fc3c9338c1a22fa8f68e862e", "branch_name": "refs/heads/main", "committer_date": 1617842110000, "content_id": "1992e0dfbac43ea7d954b6a5b7ac22900b6075f5", "detected_licenses": [ "MIT" ], "directory_id": "4d62029be62ae83d533b30b516f751e2d31d3a4e", "extension": "py", "file...
2.609375
stackv2
import pyperclip import json import requests import socket import time import os import sys if __name__ == '__main__': # Setting root BASE_PATH = os.path.dirname(os.path.dirname(os.path.abspath(__file__))) sys.path.insert(0, BASE_PATH) # Read Config with open("config.json", "r") as config: ...
41
31.85
95
16
301
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_288cb1afc75ddf1e_649ea380", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 21 ]
[ null ]
[ 15 ]
[ 36 ]
2024-11-18T21:14:37.757683+00:00
1,692,115,487,000
24cfb3cbe35a580a55d7b6c10ebd57c2a93dd65a
3
{ "blob_id": "24cfb3cbe35a580a55d7b6c10ebd57c2a93dd65a", "branch_name": "refs/heads/master", "committer_date": 1692115487000, "content_id": "4b37416c2e67edb183dcc5024d22fb795af21ac7", "detected_licenses": [ "MIT" ], "directory_id": "a413670238c682c61d96c6afd650a66c29cc81c9", "extension": "py", "fi...
3.1875
stackv2
""" GTech robots: https://smartech.gatech.edu/robots.txt Main Sitemaps: https://smartech.gatech.edu/sitemap Main has two different sitemap locations. Crawl delay: 10 This parser will go to each link and extract the links from those sitemaps and create a set of text files with the urls. """ imp...
39
27.51
128
14
336
python
[{"finding_id": "codeql_py/request-without-cert-validation_042a13ff1e2a78c3_ea6a226e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 16 ]
[ null ]
[ 9 ]
[ 40 ]
2024-11-18T21:14:39.806544+00:00
1,629,800,017,000
b8edf53b9467c459d75cc5406591a1c19b373771
3
{ "blob_id": "b8edf53b9467c459d75cc5406591a1c19b373771", "branch_name": "refs/heads/main", "committer_date": 1629800017000, "content_id": "07c2696801656892c6d548788420d3e7c5e6b095", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9584c97580e6289f00c99e0d02a86df6a29880c4", "extension": "py", ...
3.109375
stackv2
# The following is a script in streamlit that uses BinaryEdge and SecurityTrails APIs for subdomain enumeration. It takes input a domain name. # Most of the code has been written by Codex of OpenAI. I only tweaked it. import requests import json import pandas as pd import streamlit as st import time import os import r...
71
40.56
142
17
668
python
[{"finding_id": "codeql_py/partial-ssrf_f3e08072fca42df1_f82edff1", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 27, 36 ]
[ null, null ]
[ 11, 11 ]
[ 45, 45 ]
2024-11-18T21:14:43.034887+00:00
1,483,980,617,000
7e751f5d9c7276874be2c5ee8fd6fe2bdfb403be
2
{ "blob_id": "7e751f5d9c7276874be2c5ee8fd6fe2bdfb403be", "branch_name": "refs/heads/master", "committer_date": 1483980617000, "content_id": "4876a53da5703a154229700f6113d42d1311411e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "da7fc5ba8562e56f01a66fddb40624ff172ff982", "extension": "p...
2.34375
stackv2
# -*- coding: utf-8 -*- from __future__ import unicode_literals import io import itertools import os import re import jinja2 import ruamel.yaml from conda_build.metadata import ensure_valid_license_family EXPECTED_SECTION_ORDER = ['package', 'source', 'build', 'requirements', 'test', 'ap...
183
38.74
79
17
1,641
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_81422389539cac00_ab6b8fda", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 177 ]
[ null ]
[ 11 ]
[ 54 ]
2024-11-18T20:48:11.531227+00:00
1,607,638,226,000
668d5e098aceeda98b5a6f5beb30e1e04ffb55d4
3
{ "blob_id": "668d5e098aceeda98b5a6f5beb30e1e04ffb55d4", "branch_name": "refs/heads/master", "committer_date": 1607638226000, "content_id": "2455cdd235885da4efab6e79d309815919b2ca1c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "91e45236aa6022a603b09a106bffbe9bbd477bbb", "extension": "py"...
2.671875
stackv2
import os from flask import Flask, render_template, request, flash, redirect, url_for, send_from_directory from werkzeug.utils import secure_filename from docbot import * # production server from waitress import serve # bot, covering content of given text file bots = { } UPLOAD_FOLDER = '/home/UNT/ws0163/Documents/p...
119
28.5
96
16
781
python
[{"finding_id": "codeql_py/url-redirection_2e1b357af0d67757_31018afc", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 84, 90, 100 ]
[ null, null, null ]
[ 29, 29, 29 ]
[ 40, 40, 40 ]
2024-11-18T20:48:14.188609+00:00
1,588,418,545,000
2e7ce336f69f9e4bcdb6d2c4400f267cb31ce120
4
{ "blob_id": "2e7ce336f69f9e4bcdb6d2c4400f267cb31ce120", "branch_name": "refs/heads/master", "committer_date": 1588418545000, "content_id": "39bc7288fdee7b41b0bc597d205a97ceb7f0ad6d", "detected_licenses": [ "MIT" ], "directory_id": "0df888bbc159f3d3a19a17b984527a85d07d5f59", "extension": "py", "fi...
3.734375
stackv2
#关键字参数 def person(name,age,**kw): print('name:',name,'age:',age,'other:',kw) person('Bob',30) person('bob',30,city='beijing') extra={'city':'beijing','job':'engineer'} person('jack',24,city=extra['city'],job=extra['job']) person('jack',24,**extra) #命名关键字参数 def person_1(name,age,**kw): if 'city' in kw: pass...
107
17.16
69
11
761
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3e8adf2634368e95_10fcc884", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 36, 39 ]
[ null, null ]
[ 31, 31 ]
[ 34, 34 ]
2024-11-18T20:48:17.460749+00:00
1,626,816,210,000
fb30beded727c472c16f3b99eef1b450233547fc
3
{ "blob_id": "fb30beded727c472c16f3b99eef1b450233547fc", "branch_name": "refs/heads/master", "committer_date": 1626904139000, "content_id": "b1bf19887c82910b39cdf1c80e9be9a28f2307eb", "detected_licenses": [ "MIT" ], "directory_id": "a5bf41e760329b8183250d4d7155699b090272db", "extension": "py", "fi...
2.875
stackv2
# -*- coding: utf-8 -*- """ Created on Mon Jun 21 15:35:13 2021 @author: Oleg Kryachun """ from tensorflow.keras.models import model_from_json import tensorflow as tf import numpy as np import tarfile import cv2 import sys import os # local import from process_data import get_model_vars class FaceNotFound(Exception...
300
28.54
103
16
2,120
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8f2d328f84ae87a9_45bbfe01", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-022" ]
[ "py/clear-text-logging-sensitive-data", "py/tarslip" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 131, 171 ]
[ null, null ]
[ 35, 13 ]
[ 39, 21 ]
2024-11-18T20:48:25.728916+00:00
1,542,613,515,000
f70ed4ca17be9a65dd915c22e368b660f791f1d6
3
{ "blob_id": "f70ed4ca17be9a65dd915c22e368b660f791f1d6", "branch_name": "refs/heads/master", "committer_date": 1542613543000, "content_id": "855d9fc797c78584c8cee158d749f1c93027109e", "detected_licenses": [ "MIT" ], "directory_id": "d7f46cb85fe046c7aa890a918e887f14ea36ad1e", "extension": "py", "fi...
2.671875
stackv2
import jinja2 import argparse import json import os import sys def needs_overwrite( target_path, text ): if not os.path.exists( target_path ): return True with open(target_path, "r") as f: current_text = f.read() if current_text == text: return False return True def overwrite...
107
32.79
117
17
799
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_813caec4f1acc3a1_709ffb62", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 42 ]
[ null ]
[ 28 ]
[ 58 ]
2024-11-18T20:48:32.074583+00:00
1,572,838,970,000
26a37cb729df224de194ad38bea13a677dc561c6
2
{ "blob_id": "26a37cb729df224de194ad38bea13a677dc561c6", "branch_name": "refs/heads/master", "committer_date": 1572838970000, "content_id": "85e8312a24a26b2ad937a9524897143cf47a0e51", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4e250a28bae6251cfd8f03847933483acb13ce3f", "extension": "p...
2.328125
stackv2
import json import math from datetime import datetime from App import db from flask import Response, request, make_response, url_for, redirect, abort, render_template, session, jsonify from App.models import User,Order from . import user_blue from App import db,cache @user_blue.route('/') def getuser(): return "这是...
418
24
121
18
3,234
python
[{"finding_id": "codeql_py/reflective-xss_38c34be44ec7a3d3_08fe1a76", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 331 ]
[ null ]
[ 28 ]
[ 51 ]
2024-11-18T20:48:32.203938+00:00
1,587,649,436,000
42c00090ec3a5a66e97bb8a5aefe80fc134138cd
2
{ "blob_id": "42c00090ec3a5a66e97bb8a5aefe80fc134138cd", "branch_name": "refs/heads/master", "committer_date": 1587649436000, "content_id": "3e08770cc474d52b591b5f764c8ae35b098155bb", "detected_licenses": [ "MIT" ], "directory_id": "77edeb6208a4842e08d906f7219661d7bc2402b9", "extension": "py", "fi...
2.484375
stackv2
import logging import os from flask import Flask, request, jsonify, Response from flask_sqlalchemy import SQLAlchemy from flask.logging import create_logger from sqlalchemy import text from sqlalchemy.exc import ResourceClosedError app = Flask(__name__) LOG = create_logger(app) LOG.setLevel(logging.INFO) db_user = o...
56
24
77
12
351
python
[{"finding_id": "codeql_py/flask-debug_eda9f7d514b43cc6_704b7335", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 56, 40 ]
[ null, null ]
[ 5, 16 ]
[ 69, 24 ]
2024-11-18T21:11:29.553671+00:00
1,521,312,238,000
6db6086d174ea4bb4d04e14ffede9420e4526f1a
3
{ "blob_id": "6db6086d174ea4bb4d04e14ffede9420e4526f1a", "branch_name": "refs/heads/master", "committer_date": 1521312238000, "content_id": "d93f714c00845c9b2175fd4272276bc6723d4175", "detected_licenses": [ "MIT" ], "directory_id": "a862ab35e33fc7161fafea7148b109e6f097ced0", "extension": "py", "fi...
2.5625
stackv2
# -*- coding: utf-8 -*- from flask import Flask, url_for, render_template, request from format_name import * import requests import json app = Flask(__name__) @app.route('/', methods=['GET','POST']) def api_root(): if request.method == 'POST': movie_name= request.form['movie_name'] # Note that the...
24
37.62
93
13
240
python
[{"finding_id": "codeql_py/flask-debug_17a28d328c4f798e_9aad82ed", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 24, 18, 19 ]
[ null, null, null ]
[ 5, 20, 24 ]
[ 51, 59, 64 ]
2024-11-18T21:11:33.659334+00:00
1,606,970,166,000
34199e6b72037adbb9d89ffc3324c6315bd2f146
3
{ "blob_id": "34199e6b72037adbb9d89ffc3324c6315bd2f146", "branch_name": "refs/heads/main", "committer_date": 1606970166000, "content_id": "139daf02605fc0643e294140d56fb467a824aecb", "detected_licenses": [ "MIT" ], "directory_id": "3800ec95dd078e0423458c1eea35308f42ca1d2f", "extension": "py", "file...
2.546875
stackv2
from flask import Flask, render_template, request import requests as apirequest app = Flask(__name__) key="" weatherkey="" @app.route('/') def index(): ip = request.remote_addr r=apirequest.get('https://api.ipgeolocation.io/ipgeo?apiKey={0}&ip={1}&fields=geo'.format(key,ip)) thedict=r.json() try: ...
25
35.08
136
14
236
python
[{"finding_id": "codeql_py/partial-ssrf_ac2ee308dc7a5131_3a878350", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 9, 14 ]
[ null, null ]
[ 7, 12 ]
[ 103, 137 ]
2024-11-18T21:25:46.052818+00:00
1,602,321,397,000
51eea3f081211de9467c5145a1b33b34cacf6138
2
{ "blob_id": "51eea3f081211de9467c5145a1b33b34cacf6138", "branch_name": "refs/heads/main", "committer_date": 1602321397000, "content_id": "202862ead1112ed89f895577803785e292c445b4", "detected_licenses": [ "MIT" ], "directory_id": "74f92c392869742ee7d6fa2aed7d14d535d48f84", "extension": "py", "file...
2.375
stackv2
# -*- coding: utf-8 -*- from flask import Flask, request, jsonify, make_response from flask_restplus import Api, Resource, fields #from sklearn.externals import joblib import numpy as np import sys import warnings import joblib import json from insertData import insertDataFunc from imageUpload import fileUpload from ed...
127
32.59
71
26
981
python
[{"finding_id": "codeql_py/stack-trace-exposure_0d7bafbfd64b9f2a_3fdb6f41", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 123 ]
[ 127 ]
[ 19 ]
[ 5 ]
2024-11-18T21:25:52.495956+00:00
1,624,187,365,000
7f042648505aafe0ecbd92eda6053d9dedd71b59
3
{ "blob_id": "7f042648505aafe0ecbd92eda6053d9dedd71b59", "branch_name": "refs/heads/main", "committer_date": 1624187365000, "content_id": "dbf8e04e0f507d1a57615022e90a7146655387ba", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2ca417f288878e87a52c004fa56e2915c113aec3", "extension": "py", ...
3.125
stackv2
import emoji import streamlit as st from alphafy import * est = [':lemon:', ':crown:', ':pizza:', ':kissing_cat:', ':hamburger:', ':sparkles:', ':fire:', ':crescent_moon:'] emolst = [emoji.emojize(i) for i in est] def evaluate(text, ch): for i in text: st.write(eval(i + '(ch)')) st.title('...
33
22.24
84
13
218
python
[{"finding_id": "codeql_py/code-injection_30ec529b00a30540_b96c5543", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 12 ]
[ null ]
[ 27 ]
[ 37 ]
2024-11-18T21:25:57.862902+00:00
1,513,413,143,000
c6876fd36a2b3505fbf34c8baa0e5f81f271da7f
2
{ "blob_id": "c6876fd36a2b3505fbf34c8baa0e5f81f271da7f", "branch_name": "refs/heads/master", "committer_date": 1513413143000, "content_id": "4565676e85a40c0057b2cc1534e21ba761c9da72", "detected_licenses": [ "MIT" ], "directory_id": "188437aa46dca54ec8872f6e3ee1b982cf38dc00", "extension": "py", "fi...
2.390625
stackv2
import os import json import jinja2 as jj from IPython.display import display, HTML, Markdown class DemoCalculator: """ """ here = os.path.dirname(os.path.abspath(__file__)) dir_template = os.path.join(here, 'templates') loader = jj.FileSystemLoader(dir_template) env = jj.Environment(loade...
29
24.66
73
11
140
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ba695c792df028b0_8dabebd0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ 22 ]
[ 11 ]
[ 27 ]
2024-11-18T21:26:02.273199+00:00
1,522,281,230,000
9bc455a9ddb09b401f74b0453ee933deccfe28e7
4
{ "blob_id": "9bc455a9ddb09b401f74b0453ee933deccfe28e7", "branch_name": "refs/heads/master", "committer_date": 1522281230000, "content_id": "dc0c7bc8e278dbb368e58961a0d1b097ef302ce6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4aa4533cbadcb8e719f6b31af87ca39e673664d9", "extension": "py"...
3.5
stackv2
# -*- coding: utf-8 -*- import re from textblob import TextBlob def get_tweet_sentiment(tweet): ''' Utility function to classify sentiment of passed tweet using textblob's sentiment method ''' # create TextBlob object of passed tweet text analysis = TextBlob(clean_tweet(tweet)) # set sentiment if analysis.sent...
68
31.79
109
16
607
python
[{"finding_id": "codeql_py/overly-large-range_810bd548053a985b_20ba13da", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 33 ]
[ null ]
[ 50 ]
[ 53 ]
2024-11-18T21:26:03.469658+00:00
1,519,582,893,000
c17900ea3cd99ceb4c10b388169335759a8439fb
3
{ "blob_id": "c17900ea3cd99ceb4c10b388169335759a8439fb", "branch_name": "refs/heads/master", "committer_date": 1519582893000, "content_id": "632e73b060d77c27bcc82014071fda0ce1b6bd9e", "detected_licenses": [ "MIT" ], "directory_id": "3c4aeb694d7c747f63389f1ba9059028ca5289ef", "extension": "py", "fi...
2.546875
stackv2
from flask import Flask from flask_restful import Resource, Api import os import numpy as np import pandas as pd from keras.models import model_from_json port = os.getenv('VCAP_APP_PORT', '5000') def get_price_data(coinId, startDate, endDate, normalized=0): name = os.path.join("Top100Cryptos", coinId + ".csv") ...
88
31.07
82
18
748
python
[{"finding_id": "codeql_py/flask-debug_0b22642c402f250b_f2ea9f8f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 84, 13 ]
[ null, null ]
[ 5, 23 ]
[ 54, 27 ]
2024-11-18T20:31:29.087831+00:00
1,476,103,802,000
5658778af8769709a293a365756863d1e4b4c95c
2
{ "blob_id": "5658778af8769709a293a365756863d1e4b4c95c", "branch_name": "refs/heads/master", "committer_date": 1476103802000, "content_id": "f17db6592b93922a476151154f907040fcab9fe4", "detected_licenses": [ "MIT" ], "directory_id": "92c371d5f688cb52d41561015711a3bffc272f7f", "extension": "py", "fi...
2.421875
stackv2
from __future__ import print_function, division import os import sys import select import acoustid import mutagen from mutagen.easyid3 import EasyID3 as ID from collections import Counter, defaultdict import logging import click import time import re logging.basicConfig(level=logging.WARNING) logging.getLogger("urllib...
141
38.73
89
20
1,270
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c6dd9979b8d1ead4_d8926a36", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 25 ]
[ 26 ]
[ 25 ]
[ 49 ]
2024-11-18T20:31:33.198027+00:00
1,548,452,016,000
a79708bcafcd71b4815a81ce6b9d394c734fbae4
4
{ "blob_id": "a79708bcafcd71b4815a81ce6b9d394c734fbae4", "branch_name": "refs/heads/master", "committer_date": 1548452016000, "content_id": "f68c89ae5d1d65371cbebf5e831f3d9b8f2044d1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "14e9b33ad9f3f3fd6a5b9d1303448eaffe54e655", "extension": "py"...
4.4375
stackv2
def main(): # problem1() # problem2() # problem3() # problem4() challenge() # Create a class Dog. # Make sure it has the attributes name, breed, color, gender. # Create a function that will print all attributes of the class. # Create an object of Dog in your problem1 function and print all of it's ...
105
34.73
102
15
995
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1a6676a105e412b1_8c02e2ad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 19 ]
[ null ]
[ 15 ]
[ 86 ]
2024-11-18T21:00:03.027545+00:00
1,480,158,168,000
a48897d5c96c668743281efa035cf6cb49fbea43
2
{ "blob_id": "a48897d5c96c668743281efa035cf6cb49fbea43", "branch_name": "refs/heads/master", "committer_date": 1480158168000, "content_id": "84c2a108f31c1a4af29889bba8bb2d8ea025cbea", "detected_licenses": [ "MIT" ], "directory_id": "63b759bfee7657401eb2aa0975ab8041c2ae4cbb", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import os from datetime import datetime from flask import Flask, render_template, jsonify, redirect, url_for, request from Bio import SeqIO import subprocess ALLOWED_EXTENSIONS = set(['fasta', 'gbk']) app = Flask(__name__) app.config.from_object(__name__) app.config['UPLOAD...
49
29.63
141
19
332
python
[{"finding_id": "codeql_py/flask-debug_c9e537ff5c882d22_21e7af9d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 48, 29 ]
[ null, null ]
[ 5, 23 ]
[ 24, 31 ]
2024-11-18T21:00:05.393134+00:00
1,539,059,825,000
03ddeb79f3ffd0beaca575f253685c6112d9122d
3
{ "blob_id": "03ddeb79f3ffd0beaca575f253685c6112d9122d", "branch_name": "refs/heads/master", "committer_date": 1539059825000, "content_id": "efa5b3ee7f76e7ba801b813af284ef64d7a86736", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bcc162255958295a3f4f1f1816258ae49863e53a", "extension": "py"...
2.546875
stackv2
#coding=utf8 import requests import selenium.webdriver from bs4 import BeautifulSoup import random import time from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) def douyu(douyugame): game_list=[] url='HTTPs://www.douyu.com/...
263
38.68
107
21
2,495
python
[{"finding_id": "codeql_py/request-without-cert-validation_bf5e0257482b4bf3_f05620a0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 12, 144 ]
[ null, null ]
[ 9, 9 ]
[ 39, 39 ]
2024-11-18T21:10:30.626683+00:00
1,596,887,621,000
d798584c29b866a7c5539da2175e0781926c7c76
2
{ "blob_id": "d798584c29b866a7c5539da2175e0781926c7c76", "branch_name": "refs/heads/master", "committer_date": 1596887621000, "content_id": "c1d4c49e86b6e21b80ce8767d58521f543666803", "detected_licenses": [ "Apache-2.0" ], "directory_id": "73e440b0f2dbf4c6bfb41d24e97cf2b1163e1e2f", "extension": "py"...
2.46875
stackv2
from flask import Flask, request, jsonify from collections import OrderedDict from smart_open import open from google.cloud import storage from time import time import os import requests import logging import datetime try: import settings except ImportError: from . import settings logging.basicConfig(level=lo...
131
28.44
86
19
904
python
[{"finding_id": "codeql_py/flask-debug_54911ff69e912c60_984a1870", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-918", "CWE-918", "CWE-117" ]
[ "py/flask-debug", "py/full-ssrf", "py/full-ssrf", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value...
[ 131, 33, 78, 29 ]
[ null, null, null, null ]
[ 5, 10, 18, 18 ]
[ 42, 40, 48, 44 ]
2024-11-18T21:10:33.368553+00:00
1,560,096,548,000
07d7c2f5780716ebeae4fed6a76e4f8c527a55cb
2
{ "blob_id": "07d7c2f5780716ebeae4fed6a76e4f8c527a55cb", "branch_name": "refs/heads/master", "committer_date": 1560096548000, "content_id": "9e4a0b719323fb16473d0bfa46fd9f00b39485b9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cc3bdbde42857022b9c78a571af7574ae7a98a64", "extension": "py"...
2.375
stackv2
from flask import Flask, json from flask import request from flask_cors import * import os import os import networkx as nx app = Flask(__name__) CORS(app, supports_credentials=True) def summary_graph(keyword, k = 20, database = 'sembib', verbose=False): parent_path = os.path.realpath(os.path.dirname(os.path.ab...
112
27.78
120
15
794
python
[{"finding_id": "codeql_py/command-line-injection_7616535b9e50ebc7_ea925b8b", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-215" ]
[ "py/command-line-injection", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 31, 64 ]
[ null, null ]
[ 23, 5 ]
[ 30, 24 ]
2024-11-18T21:10:34.800619+00:00
1,693,318,965,000
38edb4f96db61118be2100c15c7a42764afab72a
2
{ "blob_id": "38edb4f96db61118be2100c15c7a42764afab72a", "branch_name": "refs/heads/master", "committer_date": 1693318965000, "content_id": "e4dc4ffa487ede640b3aa9e987d296347df34deb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "29eac50cc208d8aaebde699e8c851ed84b2de591", "extension": "py"...
2.40625
stackv2
""" This script creates the BUT Reverb DB dataset, which is available at: https://speech.fit.vutbr.cz/software/but-speech-fit-reverb-database The following description is taken from the official website: This is the first release of BUT Speech@FIT Reverb Database. The database is being built with respect to collect a...
139
39.26
105
14
1,691
python
[{"finding_id": "codeql_py/tarslip_36f123129eaa05cd_27b3a55a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 87 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T21:10:48.363171+00:00
1,540,135,364,000
2cdaeb7105bf76a0958be1048fe663d827f9a388
3
{ "blob_id": "2cdaeb7105bf76a0958be1048fe663d827f9a388", "branch_name": "refs/heads/master", "committer_date": 1540135364000, "content_id": "ddfee5ffb5ef79c1b95df70a262193a6d983093b", "detected_licenses": [ "MIT" ], "directory_id": "b925d02a266c5a71a8a8d933c1d2dbb81d207ed3", "extension": "py", "fi...
2.859375
stackv2
from rest_framework import status from rest_framework.decorators import api_view from rest_framework.response import Response from backend.models import Game, PlayerGame from backend.serializers import GameSerializer from random import random, choice from hashlib import sha512 from itertools import permutations from ba...
176
37.76
103
18
1,610
python
[{"finding_id": "codeql_py/stack-trace-exposure_5229f433108bc72a_7102a998", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 123 ]
[ null ]
[ 25 ]
[ 46 ]
2024-11-18T21:23:38.625315+00:00
1,592,494,038,000
825c58b7d2b78f774960c1a8e8e82dfc3e0a1c34
3
{ "blob_id": "825c58b7d2b78f774960c1a8e8e82dfc3e0a1c34", "branch_name": "refs/heads/master", "committer_date": 1592494038000, "content_id": "3274fae5c9a321b724de9a7600956bdbfa351750", "detected_licenses": [ "MIT" ], "directory_id": "3a308b3c4f24cebdee1d66c1191a7d86ee73806d", "extension": "py", "fi...
2.59375
stackv2
import glob import matplotlib.pyplot as plt import math from processResultsUtils import get_numbers_from_string from mpl_toolkits.mplot3d import Axes3D import re import copy from processResultsUtils import lineseg_dist import numpy as np # Define where the tests are stored file_location = "../AnafiSimulation/TestingAn...
120
29.06
93
13
929
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96fa3a7258636391_1cce7bf4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 100, 101 ]
[ null, null ]
[ 11, 11 ]
[ 55, 53 ]
2024-11-18T21:23:55.709237+00:00
1,454,804,297,000
f919af8cfc6f6c02f35aaf2010abed0d30114760
2
{ "blob_id": "f919af8cfc6f6c02f35aaf2010abed0d30114760", "branch_name": "refs/heads/master", "committer_date": 1454804297000, "content_id": "2ea4d55c82e59ae38bdeb57c3557d85c5ce1b923", "detected_licenses": [ "MIT" ], "directory_id": "d177bff3f38c88839eec367e9569660731cd5506", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python # Copyright (c) Twisted Matrix Laboratories. # See LICENSE for details. from __future__ import print_function import time import select import os import sys import socket import hashlib from twisted.protocols.basic import LineReceiver from twisted.internet import reactor, protocol, endpoints, ta...
197
31.35
98
23
1,399
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d0a607ec6707de1f_a267810e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-200" ]
[ "py/weak-sensitive-data-hashing", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "'' binds a socket to all interfaces." ]
[ 42, 181 ]
[ null, null ]
[ 32, 5 ]
[ 51, 25 ]
2024-11-18T21:59:01.802758+00:00
1,692,259,973,000
10b64d978814a75e2794c3ba46ec46cd58a2cbe2
2
{ "blob_id": "10b64d978814a75e2794c3ba46ec46cd58a2cbe2", "branch_name": "refs/heads/main", "committer_date": 1692259973000, "content_id": "681ded53d78d5b931913cd0c681f10917b314244", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9143962494f56b95589ae8a8d3889bba5a30981d", "extension": "py"...
2.328125
stackv2
from __future__ import annotations import functools from abc import ABC, abstractmethod import numpy as np from jinja2 import ChoiceLoader, Environment, PackageLoader import dials.extensions from dials.array_family import flex def generate_html_report(plots_data, filename): loader = ChoiceLoader( [ ...
328
32.85
80
18
2,289
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_edecae6222bc525d_5d895b61", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-18T22:11:25.044006+00:00
1,578,368,437,000
71f813ec529fd2ffa0dee803e63157cf6f015496
3
{ "blob_id": "71f813ec529fd2ffa0dee803e63157cf6f015496", "branch_name": "refs/heads/master", "committer_date": 1578368437000, "content_id": "c1316409e438682dedea3a4e9ef3ab536623b017", "detected_licenses": [ "MIT" ], "directory_id": "f06b56b66c8575b42761d2a261e4ae9484452594", "extension": "py", "fi...
2.96875
stackv2
import logging import json from flask import request, jsonify; from codeitsuisse import app; logger = logging.getLogger(__name__) @app.route('/chessgame', methods=['POST']) def evaluate2(): data = request.get_json(); logging.info("data sent for evaluation {}".format(data)) inputValue = request.get_json(...
115
29.17
60
18
693
python
[{"finding_id": "codeql_py/log-injection_7c8bd2d3c29919b4_3e30eff6", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 13 ]
[ null ]
[ 18 ]
[ 60 ]
2024-11-18T22:11:39.651317+00:00
1,521,615,181,000
8b4cf88cedbef2171528263abb6f407b4ce6b566
2
{ "blob_id": "8b4cf88cedbef2171528263abb6f407b4ce6b566", "branch_name": "refs/heads/master", "committer_date": 1521615181000, "content_id": "b32c76cfeec1065f47fef2e5e76a78079d87c1d2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2f3da88d62b5fa2c1eadec4cff4ce41dd7009409", "extension": "py"...
2.34375
stackv2
import logging, sys, os import paramiko sys.path.append(os.path.dirname(os.getcwd())) from automation.config import HOSTNAME logging.basicConfig(level=logging.DEBUG) def mk_dir(username, hostname): # setup a SSHClient object ssh = paramiko.SSHClient() # 允许将信任的主机自动加入到host_allow 列表,此方法必须放在connect方法的前面 ...
75
25.08
87
13
487
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e12f2f6c16ae00bb_c31e725d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 15, 43 ]
[ null, null ]
[ 5, 5 ]
[ 62, 62 ]
2024-11-18T22:11:44.312607+00:00
1,567,724,182,000
58b99cc384a62194fe2adb47d1ce15d27da79a89
3
{ "blob_id": "58b99cc384a62194fe2adb47d1ce15d27da79a89", "branch_name": "refs/heads/master", "committer_date": 1567724182000, "content_id": "f97508b85705906f650d1b8ba37aac7fb4cc9371", "detected_licenses": [ "MIT" ], "directory_id": "a32ee565258e1eae8d7c5b34bcbf57e270eeb0cb", "extension": "py", "fi...
2.859375
stackv2
import sys import json import datetime import requests import html import tldextract from bs4 import BeautifulSoup, Comment import re import signal from urllib.parse import urlparse from urllib.parse import parse_qs ''' This contains utilities used by other functions in the YoutubeDataApi class, as well as a few conv...
189
27.76
134
19
1,373
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8f3d04d138f80e33_ff22e344", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL.", "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL.", "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 108, 110, 125 ]
[ null, null, null ]
[ 10, 10, 10 ]
[ 33, 33, 33 ]
2024-11-18T22:11:51.014122+00:00
1,518,970,757,000
29338c3c40a0c689a9c92898ba73334493403f07
3
{ "blob_id": "29338c3c40a0c689a9c92898ba73334493403f07", "branch_name": "refs/heads/master", "committer_date": 1518970757000, "content_id": "3e69b002c2cf8dd55a0b606059480c78fe7908a8", "detected_licenses": [ "MIT" ], "directory_id": "ae53f48ac67cf73bd79c93a19edb5850687cbebf", "extension": "py", "fi...
2.734375
stackv2
import os import re import time from configparser import RawConfigParser from urllib.parse import urljoin from urllib.request import urlopen, build_opener from bs4 import BeautifulSoup from financial_statements_downloader.data import Data PARSER = "html5lib" """BeautifulSoup parser.""" WAIT = 1 """Wait seconds afte...
186
31.34
134
24
1,437
python
[{"finding_id": "codeql_py/overly-large-range_f033e8f55b194e3b_3d06629f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\u00e1-\\u017e in the same character class.", "remediatio...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\u00e1-\\u017e in the same character class." ]
[ 87 ]
[ null ]
[ 47 ]
[ 50 ]
2024-11-18T22:11:53.784734+00:00
1,464,246,581,000
3dd6039833f960d33a025d4acd407be47a084795
3
{ "blob_id": "3dd6039833f960d33a025d4acd407be47a084795", "branch_name": "refs/heads/master", "committer_date": 1464246581000, "content_id": "d187892dc3ac6956da41d3165ff15a894d4b4e35", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a868f5f506df840bdb7119a9106331c19def4978", "extension": "py"...
2.6875
stackv2
from __future__ import unicode_literals, absolute_import, print_function import logging import math import tarfile import hashlib # Processing functions, untar, calculating stats etc... # TODO some kind of logging?? # How do we know where the database is??? def process_upload(uploaded_file): from .ResultDataProcess...
304
23.33
80
20
2,485
python
[{"finding_id": "codeql_py/tarslip_4ca334a5023e2ce8_de78aff3", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 23 ]
[ null ]
[ 3 ]
[ 6 ]
2024-11-18T22:24:00.307100+00:00
1,573,209,593,000
0a826e3cdd9e1771a121c92b4deab3603c77543c
3
{ "blob_id": "0a826e3cdd9e1771a121c92b4deab3603c77543c", "branch_name": "refs/heads/master", "committer_date": 1573209593000, "content_id": "038103ef2240aabfd8cc0c60138c47f1f616f668", "detected_licenses": [ "MIT" ], "directory_id": "d0e04bdce91baef10ea235491a9bdf492703b6df", "extension": "py", "fi...
2.5625
stackv2
import sys import os import subprocess EXEC = sys.executable #local pythonw.exe def run_py_file(py_path): result = subprocess.run([EXEC, py_path], stdout=subprocess.PIPE, stderr=subprocess.STDOUT, universal_newlines=True) return str(result.stdout) def run_py_codes(py_codes): codes = str(py_codes) if ...
57
26.68
119
16
421
python
[{"finding_id": "codeql_py/code-injection_f53003dd389f52df_e6ea1d78", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 15 ]
[ null ]
[ 31 ]
[ 36 ]
2024-11-18T22:24:16.479928+00:00
1,578,255,878,000
628fdb22522e80964090de9cd594df1d68d23c0f
2
{ "blob_id": "628fdb22522e80964090de9cd594df1d68d23c0f", "branch_name": "refs/heads/master", "committer_date": 1578255878000, "content_id": "91ee70ef9d6313b830c8f9281c42c6a36a7dca7f", "detected_licenses": [ "MIT" ], "directory_id": "4a44931f329859fffff8c8582cce2c78d047dcdb", "extension": "py", "fi...
2.390625
stackv2
from sqlalchemy.orm import Session import hashlib from . import models, schemas salt = "salt1" def get_users(db: Session, skip: int = 0, limit: int = 100): return db.query(models.User).offset(skip).limit(limit).all() def get_user(db: Session, user_id: int): return db.query(models.User).filter(models.User....
32
32.69
134
15
250
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_05749c19e163708d_6f2d9740", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e...
[ 22, 27 ]
[ null, null ]
[ 36, 36 ]
[ 74, 74 ]
2024-11-18T22:36:17.665986+00:00
1,388,271,636,000
9060f4a3e224579343ec2b9b21345a9727e06b9a
3
{ "blob_id": "9060f4a3e224579343ec2b9b21345a9727e06b9a", "branch_name": "refs/heads/master", "committer_date": 1388271636000, "content_id": "bde4a664a76529162b7f18f7ba5c1bd754d33dc1", "detected_licenses": [ "MIT" ], "directory_id": "c555e2527e2b730497590e6ffb6d197c8d477137", "extension": "py", "fi...
2.734375
stackv2
import flask import random app = flask.Flask(__name__) @app.route("/") def blunder(): return "Never get involved in a land war in Asia." @app.route("/fourup", methods=["POST"]) def fourup_move(): if flask.request.json is None: raise ValueError("No JSON match data found") toprow = flask.request...
47
24.7
71
13
301
python
[{"finding_id": "codeql_py/flask-debug_a98d9faf34e967d7_372e58d8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 47, 42 ]
[ null, null ]
[ 5, 16 ]
[ 24, 62 ]
2024-11-18T22:36:34.266430+00:00
1,522,825,225,000
222127c0bff0fc2af96e1fc8d7d8a2e80b55cfac
2
{ "blob_id": "222127c0bff0fc2af96e1fc8d7d8a2e80b55cfac", "branch_name": "refs/heads/master", "committer_date": 1522825225000, "content_id": "d63a90301e4ce3ff3af4fbdc423339ccff778dfd", "detected_licenses": [ "MIT" ], "directory_id": "a48d2daf100be8a6336d2d765739023531491dc9", "extension": "py", "fi...
2.421875
stackv2
import requests, urllib, json, logging, sys, base64, datetime, math import pprint class FreedomPop: session = requests.Session() #logging.basicConfig(level=logging.DEBUG) logger = logging.getLogger('FreedomPop') #handler = logging.StreamHandler() #logger.addHandler(handler) #logger.setLevel(lo...
230
38.3
123
20
2,013
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_115c6e2138ca94f1_769be04c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (priva...
[ 204, 217 ]
[ null, 220 ]
[ 20, 24 ]
[ 63, 65 ]
2024-11-18T22:36:36.274945+00:00
1,540,633,128,000
24699e2a648f81b6926748296d541fb615d594dc
3
{ "blob_id": "24699e2a648f81b6926748296d541fb615d594dc", "branch_name": "refs/heads/master", "committer_date": 1540633128000, "content_id": "3e61bae6b791ab488b3638852f3f82eaf77fc629", "detected_licenses": [ "MIT" ], "directory_id": "09d3fb0fe56d63d40e140a8058da28c44d4d54f8", "extension": "py", "fi...
2.578125
stackv2
import ssl import socket import pickle import time from params import params from log import get_logger CERT_FILE = '/home/SDPSource/openssl/cert.crt' KEY_FILE = '/home/SDPSource//openssl/rsa_private.key' LATENCY = 0 class DisconnectException(Exception): pass def valid_ip(address): try: socket.in...
147
25.14
99
17
826
python
[{"finding_id": "codeql_py/insecure-protocol_560b1f1e5651b072_489a4d54", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 46 ]
[ null ]
[ 30 ]
[ 37 ]
2024-11-18T22:36:38.469970+00:00
1,413,889,370,000
64104fb24dfc94931c6dfcbdbef9e1ce9cf83c9f
3
{ "blob_id": "64104fb24dfc94931c6dfcbdbef9e1ce9cf83c9f", "branch_name": "refs/heads/master", "committer_date": 1413889370000, "content_id": "b6f72c28937535222dd96d4420988f3a57966fe9", "detected_licenses": [ "MIT" ], "directory_id": "ebbb5fd79e8ea187de2e4deafd340b15a361020e", "extension": "py", "fi...
2.546875
stackv2
# coding=utf-8 # Copyright 2013 Janusz Skonieczny import logging import os from flask import request, current_app MSG = u''' Message type: %(levelname)s Location: %(pathname)s:%(lineno)d Module: %(module)s Function: %(funcName)s Time: %(asctime)s Message: %(message)s ''' EXTRA_MSG = u""" URL...
124
30.09
144
15
924
python
[{"finding_id": "codeql_py/log-injection_e1756bfca86f7063_a4f86b29", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 76 ]
[ null ]
[ 23 ]
[ 48 ]
2024-11-18T20:23:40.564196+00:00
1,593,478,440,000
676c0df825582bdce85f347390ed08b90d47c875
3
{ "blob_id": "676c0df825582bdce85f347390ed08b90d47c875", "branch_name": "refs/heads/master", "committer_date": 1593478440000, "content_id": "d28e7d06d983a26f81445c742c98e2b0f0d41679", "detected_licenses": [ "MIT" ], "directory_id": "2feb2b7be0ce2fffdd0e1d3f8d67483c7d27443a", "extension": "py", "fi...
3.3125
stackv2
# import pyspark class Row from module sql from pyspark.sql import * # Create Example Data - Departments and Employees # Create the Departments department1 = Row(id='123456', name='Computer Science') department2 = Row(id='789012', name='Mechanical Engineering') department3 = Row(id='345678', name='Theater and Drama...
29
45.52
88
8
379
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_92f30aea10d02c2b_57fee279", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 28 ]
[ null ]
[ 7 ]
[ 16 ]
2024-11-18T21:22:14.756369+00:00
1,661,361,842,000
674e7146db3a174c5dc908fc2adcba96690ce121
3
{ "blob_id": "674e7146db3a174c5dc908fc2adcba96690ce121", "branch_name": "refs/heads/master", "committer_date": 1661361842000, "content_id": "3a078fa75af5f40db4a1049c930ff82fafa813c6", "detected_licenses": [ "MIT" ], "directory_id": "3aaf0f67afb74c245d31c0bf677afaaa064cae9e", "extension": "py", "fi...
2.78125
stackv2
#!/usr/bin/python3 import jinja2 import sys import os import shutil from project import Project from post import Post class Generator: # projects: [Project] # posts: [Post] def __init__(self, projects_dir, posts_dir, templates_dir): self.projects = [] self.posts = [] self.env = jin...
68
39.4
140
16
605
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fb317b66c96aacf0_b9d4fd39", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ null ]
[ 20 ]
[ 96 ]
2024-11-18T21:22:22.646769+00:00
1,516,789,783,000
27e09ce9a5a50f8d7d4b1c372db26e0947cb1243
2
{ "blob_id": "27e09ce9a5a50f8d7d4b1c372db26e0947cb1243", "branch_name": "refs/heads/master", "committer_date": 1516789783000, "content_id": "9b78b275dc5b740047681cc52e79c3eeab7a0248", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5e55d4399bc76a4501f18440cdc52b819949e314", "extension": "py"...
2.4375
stackv2
# http://localhost:8000/getreply?key=xxxx&lang=en&input=hola import tornado.ioloop import tornado.web import argparse import sys import os import tensorflow as tf import time import logging from settings import PROJECT_ROOT from chatbot.botpredictor import BotPredictor os.environ['TF_CPP_MIN_LOG_LEVEL'] = '3' logging...
58
31.45
77
18
449
python
[{"finding_id": "codeql_py/stack-trace-exposure_2501830aa1964a60_7cbb4a94", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 29, 34 ]
[ null, null ]
[ 24, 20 ]
[ 39, 41 ]
2024-11-18T21:22:25.122300+00:00
1,444,129,618,000
3af1319e5cc34e65dbd011b47eed92b0618fc236
3
{ "blob_id": "3af1319e5cc34e65dbd011b47eed92b0618fc236", "branch_name": "refs/heads/master", "committer_date": 1444129618000, "content_id": "9d461250da6d0cc6089ba3f6e754b348744fa750", "detected_licenses": [ "MIT" ], "directory_id": "111548be9dae8785202a9273887fd6faf4c6abe0", "extension": "py", "fi...
2.53125
stackv2
import re import os import yaml import codecs import argparse import jinja2 import misaka as m import unidecode from pygments import highlight from pygments.lexers import get_lexer_by_name from pygments.formatters import HtmlFormatter from flask import escape RE_NON_WORD = re.compile(r'\W+') def slugify(s): s = u...
101
28.37
75
19
719
python
[{"finding_id": "codeql_py/flask-debug_dc11bfcfdb09fda1_116570eb", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 78, 62 ]
[ null, null ]
[ 5, 16 ]
[ 36, 67 ]
2024-11-18T21:22:25.800470+00:00
1,466,971,282,000
beeac58e23ce2cb7d703a057011c868b24cb6942
2
{ "blob_id": "beeac58e23ce2cb7d703a057011c868b24cb6942", "branch_name": "refs/heads/master", "committer_date": 1466971282000, "content_id": "5125d557308e7edfdd4d424d577dca12468ee1b6", "detected_licenses": [ "ISC" ], "directory_id": "29849f8aeb9c7ca5fc3a64510036bd6b6b8c09bd", "extension": "py", "fi...
2.421875
stackv2
from __future__ import unicode_literals import logging from jinja2 import Template logger = logging.getLogger(__name__) FILE_TEMPLATE = Template(""" rules = { {%- for entity in entities %} {{ render_entity(entity) }} {%- endfor %} } """.lstrip()) ENTITY_TEMPLATE = Template(""" "{{ entity['name'] }}"...
183
24.45
90
19
1,036
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_919171b75be7b80b_5ea67635", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11, 20, 25 ]
[ 17, 22, 31 ]
[ 17, 19, 24 ]
[ 14, 13, 13 ]
2024-11-18T21:22:28.862133+00:00
1,531,994,607,000
a29c0651e239f632c2a0b8e1dac6b2f092d9855e
3
{ "blob_id": "a29c0651e239f632c2a0b8e1dac6b2f092d9855e", "branch_name": "refs/heads/master", "committer_date": 1531994607000, "content_id": "1c87f62846d47c8b657a6f604d114415fe40db42", "detected_licenses": [ "MIT" ], "directory_id": "8e4abfe517acf760ae79092fb8b10b4cbf59c624", "extension": "py", "fi...
2.609375
stackv2
# -*- coding: utf-8 -*- __author__ = 'patrick' import urllib import hashlib from xml.dom import minidom from functions import windrichtung ########## Wetter von Yahoo ########## WEATHER_URLY = 'http://xml.weather.yahoo.com/forecastrss?w=%s&u=c' WEATHER_NSY = 'http://xml.weather.yahoo.com/ns/rss/1.0' def yahoowetter...
77
41.77
98
17
812
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_79fb25d7e7d51aab_9446bb74", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 53 ]
[ null ]
[ 28 ]
[ 59 ]
2024-11-18T21:22:37.956087+00:00
1,565,364,183,000
2803ca30254cb1ec1fee8acb0dcd3409e692ed32
3
{ "blob_id": "2803ca30254cb1ec1fee8acb0dcd3409e692ed32", "branch_name": "refs/heads/master", "committer_date": 1565364183000, "content_id": "1b6be111925341f74d32750a0d59fea922175834", "detected_licenses": [ "MIT" ], "directory_id": "b99b456a9fbbea78ca71cceb122b25fefbe41e13", "extension": "py", "fi...
2.71875
stackv2
from selenium import webdriver import time import re #from selenium.webdriver.common.keys import keys def clean_string(str_to_clean): clean_str = str_to_clean clean_str = clean_str.replace(":", "<#><#>") clean_str = clean_str.replace(";", "<$<$<") clean_str = clean_str.replace(",", ">*>*>") clean_s...
57
39.51
97
22
509
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_926ec83c001ea993_e9cf9b3b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [doi.org](1) may be at an arbitrary position in the san...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [doi.org](1) may be at an arbitrary position in the sanitized URL.", "The string [link.springer.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 37, 56 ]
[ null, null ]
[ 20, 12 ]
[ 59, 39 ]
2024-11-18T21:22:39.848455+00:00
1,623,198,748,000
8d3388e95da140c0d269fa5aebac5ab0f4f3b1f1
2
{ "blob_id": "8d3388e95da140c0d269fa5aebac5ab0f4f3b1f1", "branch_name": "refs/heads/master", "committer_date": 1623198748000, "content_id": "9f534fb8aba2e4a78b4fb0469ebedd88c4e9e649", "detected_licenses": [ "Apache-2.0" ], "directory_id": "696b9f24963428de1d1bd65a4b4705d054a9bfd6", "extension": "py"...
2.453125
stackv2
import os # import django import sys from os.path import dirname, abspath # # sh00t_path = dirname(dirname(abspath(__file__))) # sys.path.append(sh00t_path) # os.environ.setdefault("DJANGO_SETTINGS_MODULE", "sh00t.settings") # django.setup() def generate_secret_key(): secret_file = "/root/sh00t/sh00t/secret.txt" ...
34
31.97
105
15
279
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f95442a9f67d32b9_b9f2a67f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 21 ]
[ null ]
[ 22 ]
[ 32 ]
2024-11-18T21:51:08.914745+00:00
1,611,954,818,000
c09c000b2e9536f01668acd9630edcc786079159
2
{ "blob_id": "c09c000b2e9536f01668acd9630edcc786079159", "branch_name": "refs/heads/main", "committer_date": 1611954818000, "content_id": "358a6053ddee3689dc13ee6b0627342dd17e6634", "detected_licenses": [ "MIT" ], "directory_id": "4791c7dfa6ab838741f69d507d7a4431812815aa", "extension": "py", "file...
2.375
stackv2
import re from datetime import datetime, timedelta, timezone from typing import Dict, List, Optional from urllib.parse import unquote import semver # type: ignore from dateutil import parser from gitlab.v4.objects import ( # type: ignore Project, ProjectIssue, ProjectMergeRequest, ProjectTag, ) from ...
234
34.6
96
16
1,822
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_732745adc576412a_bc569ba0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 65 ]
[ null ]
[ 26 ]
[ 62 ]
2024-11-18T21:51:30.793607+00:00
1,563,452,363,000
9a7b88faf1898e1787b4458c5976b4b57982e020
3
{ "blob_id": "9a7b88faf1898e1787b4458c5976b4b57982e020", "branch_name": "refs/heads/master", "committer_date": 1563452363000, "content_id": "4eed10135e7d1fbf9c9eb7242f2205f408f5bca7", "detected_licenses": [ "MIT" ], "directory_id": "1f849a940f2971bd3284b45929d3c354a0a089e6", "extension": "py", "fi...
3.3125
stackv2
""" Command line Tool for looking up MAC Address information from macaddress.io Parameters: mac_address (str): Mac Address to be looked up against macaddress.io """ import json import argparse import os import yaml import requests def get_mac_addr(userkey, mac): """ Function to get the Mac Address Info reques...
61
35.41
98
14
510
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b18d1abeb9aa9f3_ce731170", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 57, 59, 61 ]
[ null, null, null ]
[ 15, 15, 15 ]
[ 63, 80, 37 ]