added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T02:45:54.667420+00:00
1,675,884,890,000
75578213a5bfbf12a01c80d41c834f2d2376e6c1
3
{ "blob_id": "75578213a5bfbf12a01c80d41c834f2d2376e6c1", "branch_name": "refs/heads/master", "committer_date": 1675884890000, "content_id": "9e95f155c90cd24687a5de8cfa631fe2f7c86fa8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "30b06187f8c6f30de84b8a93f24bce5562afa947", "extension": "py"...
3.09375
stackv2
""" Module to GET and configure IP static routes. """ import requests import json from src import common def get_ip_route(baseurl, cookie_header): """ Get ip static route data :param baseurl: imported baseurl variable :param cookie_header: Parse cookie resulting from successful loginOS.login_os(baseu...
86
36.63
110
14
821
python
[{"finding_id": "codeql_py/request-without-cert-validation_4f76f55624e3cf19_de1a73bc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 19, 62 ]
[ null, null ]
[ 11, 19 ]
[ 59, 99 ]
2024-11-19T02:57:26.499795+00:00
1,575,098,394,000
01b7f09552e7e8c54457c5e3157ae27a312d8fca
2
{ "blob_id": "01b7f09552e7e8c54457c5e3157ae27a312d8fca", "branch_name": "refs/heads/master", "committer_date": 1575098394000, "content_id": "282d74b2fb07d8c000fd613cbd311d36d5649282", "detected_licenses": [ "MIT" ], "directory_id": "c374596e06c02cf5d6ea8cc97ab19f4580042d96", "extension": "py", "fi...
2.328125
stackv2
from flask import Flask, render_template, request, redirect, url_for, session, make_response from flask_mysqldb import MySQL from flask_mail import Mail, Message import MySQLdb.cursors import re import uuid import hashlib import datetime app = Flask(__name__) app.secret_key = 'seocho' app.config['threaded'] = True ...
226
46.44
159
18
2,336
python
[{"finding_id": "codeql_py/polynomial-redos_f80c8adc7ff094cc_62d58091", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
5
true
[ "CWE-1333", "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/polynomial-redos", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'.", "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password...
[ 97, 42, 58, 88, 183 ]
[ null, null, null, null, null ]
[ 50, 29, 37, 29, 33 ]
[ 55, 42, 50, 42, 46 ]
2024-11-19T03:12:15.349130+00:00
1,530,820,845,000
f09ed1fc27f682d548eeaf3cb9f62845195c7a56
2
{ "blob_id": "f09ed1fc27f682d548eeaf3cb9f62845195c7a56", "branch_name": "refs/heads/master", "committer_date": 1530820845000, "content_id": "15ec32708d96f55770359939345e7bb26bbb560d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e7a3bd71560d94e2c74e30228bd6bc454ef5823c", "extension": "py"...
2.40625
stackv2
#!/usr/bin/env python # Copyright 2017, Timothy Schutt. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicab...
87
31.54
105
14
675
python
[{"finding_id": "codeql_py/path-injection_7ee3741d29e8b72e_a3e4e5cb", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 62, 63 ]
[ null, null ]
[ 27, 18 ]
[ 38, 29 ]
2024-11-19T03:12:23.393672+00:00
1,598,439,094,000
e154fb357dfd69dfa834e8a978ddf785d24e049d
2
{ "blob_id": "e154fb357dfd69dfa834e8a978ddf785d24e049d", "branch_name": "refs/heads/master", "committer_date": 1598439094000, "content_id": "aff3a825112cc72f1aff7a6a596aaa29072ca4da", "detected_licenses": [ "MIT" ], "directory_id": "310b11ea8391743ecf89efe3c78ea268af1ac653", "extension": "py", "fi...
2.375
stackv2
from selenium import webdriver from selenium.webdriver.common.keys import Keys import time import os.path if not os.path.isfile('passewords.txt'): passes = [] for i in range(0,26): for j in range(0, 26): for k in range(0,26): for l in range(0,26): password = "kar505" password = password + chr(or...
64
19.11
98
24
381
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_790750d54f936a69_a947f679", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19, 48 ]
[ null, null ]
[ 11, 42 ]
[ 26, 50 ]
2024-11-19T01:33:45.078271+00:00
1,624,715,675,000
31a364da7788817414ad649f0984b62a6bb31073
2
{ "blob_id": "31a364da7788817414ad649f0984b62a6bb31073", "branch_name": "refs/heads/main", "committer_date": 1624715675000, "content_id": "4934f07b20ea94e6ae079aa95aee8044fa35621a", "detected_licenses": [ "MIT" ], "directory_id": "fe8590fd315ad500c0973205258679a2cf650b84", "extension": "py", "file...
2.40625
stackv2
import os import re import sys import json import argparse import requests import threading from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) # UCM Exploit Loader #$top_parser = argparse.ArgumentParser(description='') #$top_parser...
103
35.86
135
16
977
python
[{"finding_id": "codeql_py/request-without-cert-validation_0c92538a207d5588_42d0aed3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 31, 77 ]
[ null, 78 ]
[ 20, 20 ]
[ 79, 76 ]
2024-11-19T01:33:52.676607+00:00
1,410,720,751,000
9d6e9ef69b17ddf974b1ccd682514a5cf791eeb8
2
{ "blob_id": "9d6e9ef69b17ddf974b1ccd682514a5cf791eeb8", "branch_name": "refs/heads/master", "committer_date": 1410720751000, "content_id": "10142c1f0bc59490e9eb954de6fa670990f7de2f", "detected_licenses": [ "MIT" ], "directory_id": "d1119777cc0ea85603bdcfffdd63f2dba47a5575", "extension": "py", "fi...
2.390625
stackv2
from flask import Flask, flash, url_for, request, render_template from flask.ext.mail import Mail from flask.ext.mail import Message import shutil import sqlite3 as sqlite import random import re import os app = Flask(__name__) """ CONFIGURATION SETTINGS """ app.secret_key = 'qoifj329fOKo32fkAOKQokweoekfeofkeokfewoFK...
126
35.01
124
24
1,107
python
[{"finding_id": "codeql_py/path-injection_b73fdabb61d328db_1ee8741e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 99 ]
[ null ]
[ 27 ]
[ 49 ]
2024-11-19T01:57:15.453336+00:00
1,449,560,411,000
85e6e336b216cd94a58f3f6b46fbeac4da9f2f69
3
{ "blob_id": "85e6e336b216cd94a58f3f6b46fbeac4da9f2f69", "branch_name": "refs/heads/master", "committer_date": 1449560411000, "content_id": "fbf45bdd20432e795e7ac87758f41b0a100133f2", "detected_licenses": [ "MIT" ], "directory_id": "18a83132fb83ab84dc8e1cdd5d01a80a3d38a387", "extension": "py", "fi...
2.953125
stackv2
#!/usr/bin/python from BaseHTTPServer import BaseHTTPRequestHandler,HTTPServer import httplib import threading from socket import socket PORT_NUMBER = 8080 class test_server: def __init__(self): self.ip = "192.168.56.11" self.test_server_timer() def tcp_test(self, server_info): cpos...
88
28.19
78
17
596
python
[{"finding_id": "codeql_py/partial-ssrf_32302a782dcfc34d_9133c8b4", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).", "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)." ]
[ 58, 60 ]
[ null, null ]
[ 17, 17 ]
[ 67, 56 ]
2024-11-19T01:57:18.723369+00:00
1,635,354,168,000
84a8bfc8debd514cb4ecd6313cdda1faba080973
3
{ "blob_id": "84a8bfc8debd514cb4ecd6313cdda1faba080973", "branch_name": "refs/heads/main", "committer_date": 1635354168000, "content_id": "6f8952a1dc73059cec250bea1ce5d3ec6c9276ae", "detected_licenses": [ "MIT" ], "directory_id": "abbd09cd2487ba36567c423838a723ae342b1f4a", "extension": "py", "file...
2.5625
stackv2
# Importing functions from the class bottle from bottle import run, get, post, request import random @get("/") # Can use same method name because of the decorator def do(): print(type(random.randint(1, 1000000))) return str(random.randint(1, 1000000)) @post("/signin") def do(): # Getting the form data ...
21
24.52
62
12
155
python
[{"finding_id": "codeql_py/reflective-xss_8983521354411905_799a2200", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 12 ]
[ 57 ]
2024-11-19T01:57:30.538440+00:00
1,631,285,027,000
0dc268e98b9b1a34015f8ff5acf28218087279f3
2
{ "blob_id": "0dc268e98b9b1a34015f8ff5acf28218087279f3", "branch_name": "refs/heads/main", "committer_date": 1631285027000, "content_id": "f2f7776900bffc800c8172d4d4ec247e68626163", "detected_licenses": [ "Apache-2.0" ], "directory_id": "00d5657ec98861de165deaa449dc27ccbd289173", "extension": "py", ...
2.40625
stackv2
import sql import mysql.connector from flask import Flask, render_template, request from datetime import datetime import webbrowser app = Flask(__name__) url = 'http://localhost:5000/' webbrowser.register('chrome', None, webbrowser.BackgroundBrowser("C:\Program Files\Google\Chr...
317
32.79
118
21
3,119
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e98c6924e7f69642_cffda85a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-215", "CWE-079" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 23, 317, 76 ]
[ null, null, null ]
[ 11, null, 12 ]
[ 16, 20, 15 ]
2024-11-19T02:11:11.710063+00:00
1,378,625,988,000
786807f2b28b3f42fbf7615dba37b3856b9b39f0
3
{ "blob_id": "786807f2b28b3f42fbf7615dba37b3856b9b39f0", "branch_name": "refs/heads/master", "committer_date": 1378625988000, "content_id": "4d10e34eb24cb6dfe80922d3d4ef79a6bd14f672", "detected_licenses": [ "MIT" ], "directory_id": "117939bcb843b73048bce5ad4cfdac46864690b3", "extension": "py", "fi...
2.65625
stackv2
#!/bin/python # Include the Dropbox SDK libraries from dropbox import client, rest, session import os, sys # Get your app key and secret from the Dropbox developer website APP_KEY = '' APP_SECRET = '' TOKEN = './access.txt' # ACCESS_TYPE should be 'dropbox' or 'app_folder' as configured for your app ACCESS_TYPE = 'dro...
96
27.3
89
17
694
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8d476b3f4c9a037a_b6c9551e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 29 ]
[ null ]
[ 12 ]
[ 61 ]
2024-11-19T02:11:17.594633+00:00
1,692,829,188,000
12cc8172d72f533add79c33e586d7e60980bd684
3
{ "blob_id": "12cc8172d72f533add79c33e586d7e60980bd684", "branch_name": "refs/heads/master", "committer_date": 1692829188000, "content_id": "91787d916009a44f5105416fefcd1344ed6c7a4c", "detected_licenses": [ "MIT", "Python-2.0" ], "directory_id": "4207698ab3d15c6d81bb205264b7de8297ba47e3", "exten...
3.140625
stackv2
import os import tarfile import zipfile import requests import subprocess from tqdm import tqdm from urllib.parse import urlparse def download_file(url: str, directory: str): """ Download the file at ``url`` to ``directory``. Extract to the file content ``directory`` if the original file is a tar, tar...
102
26.91
74
15
653
python
[{"finding_id": "codeql_py/tarslip_efa9ebe797c1d246_c656051a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 61 ]
[ null ]
[ 13 ]
[ 14 ]
2024-11-19T02:11:19.825883+00:00
1,573,503,738,000
fea1a2176867e0bfe50b79639584e71727e6995d
4
{ "blob_id": "fea1a2176867e0bfe50b79639584e71727e6995d", "branch_name": "refs/heads/master", "committer_date": 1573503738000, "content_id": "044a6886d3f49b24f5910e8f84dc33bdb0eee81c", "detected_licenses": [ "MIT" ], "directory_id": "78ed7dbe33d1b8df474de7df4806ddada0b9799a", "extension": "py", "fi...
3.84375
stackv2
#!/use/bin/env python3 import random import time def word_processing(secret_word, alphabet, letter, hashed, losing, man): """Handling of word arrays. hashing, validation and removing. Args: secret_word (str): The word to be guessed, alphabet (str): The remaining letters of the alphabet avail...
205
34.27
121
17
1,670
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_13c40aeb0f46405e_cafdc6bb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a...
[ 87, 193 ]
[ 88, 194 ]
[ 15, 15 ]
[ 100, 100 ]
2024-11-19T02:33:11.586170+00:00
1,465,250,310,000
b8176f2bbdcded444af424dbfb7d0fda690403c0
3
{ "blob_id": "b8176f2bbdcded444af424dbfb7d0fda690403c0", "branch_name": "refs/heads/master", "committer_date": 1465250310000, "content_id": "edd48d2811ddddd236ecbfc59c553b8cf13eb02b", "detected_licenses": [ "MIT" ], "directory_id": "275a1843e55c9bf351f28b6d89981c842549320d", "extension": "py", "fi...
2.71875
stackv2
""" Views for Messy. """ from django.http import HttpResponseRedirect, JsonResponse from messy import stats_writer def get_stats(request): """ Gets the aggregate message stats. Note: This is the high-traffic view - notice how we don't hit the database from here. """ stats_url = stats_wr...
36
26.17
95
14
211
python
[{"finding_id": "codeql_py/stack-trace-exposure_f9a779539b37556e_a0a156dd", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 35 ]
[ null ]
[ 29 ]
[ 71 ]
2024-11-19T02:33:33.403431+00:00
1,399,125,678,000
11afc5f45b07db794c707a281e2ec17a2b77e9f5
3
{ "blob_id": "11afc5f45b07db794c707a281e2ec17a2b77e9f5", "branch_name": "refs/heads/master", "committer_date": 1399125678000, "content_id": "d7430ec759ab935ba7007750dae82b01cde8c5d9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3c016bef96922caf0081b01845fd8f4b464caeee", "extension": "py"...
2.5625
stackv2
#!/usr/bin/python import optparse import sys import os import logging import cmd from cli import cmdinterpretor log = logging.getLogger(__name__) #this is the entry point of the commandline client. # 1. enter in to stratos shell session # 2. use the 'stratos' a unix command def authenticate_authorize(): pars...
54
25.63
115
11
323
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2b379e927a699e9a_18623401", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 27 ]
[ null ]
[ 11 ]
[ 27 ]
2024-11-19T02:46:04.879535+00:00
1,576,101,020,000
e408e3e2eca3c780e00537a2a7054bb0d5635eb2
3
{ "blob_id": "e408e3e2eca3c780e00537a2a7054bb0d5635eb2", "branch_name": "refs/heads/master", "committer_date": 1576101020000, "content_id": "34a9b7f29806460bc5e005a3e92dc02de0b47878", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fbe8d9693f3b1fcf6c158be13e837083161f7b7c", "extension": "py"...
2.65625
stackv2
""" Fakes for Product service """ import logging import sys from flask import Flask, jsonify, make_response from flask_api import status # HTTP Status Codes APP = Flask(__name__) if not APP.debug: print('Setting up logging...') # Set up default logging for submodules to use STDOUT # datefmt='%m/%d/%Y...
45
32.49
76
13
371
python
[{"finding_id": "codeql_py/log-injection_6aa4212679cbe7cd_fcf0f2b5", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 21 ]
[ 76 ]
2024-11-19T02:46:07.001546+00:00
1,691,280,063,000
23b8fefe9a41cd289d538a684b5bfe908ea52aad
3
{ "blob_id": "23b8fefe9a41cd289d538a684b5bfe908ea52aad", "branch_name": "refs/heads/master", "committer_date": 1691280063000, "content_id": "bdf3a0838ec942b9966655538a47690e3a5cd91f", "detected_licenses": [ "MIT" ], "directory_id": "66265bfa22babb308128fe25ca9734de1885f55b", "extension": "py", "fi...
2.546875
stackv2
import text2text as t2t import numpy as np import socket import threading from flask import Flask, request app = Flask(__name__) @app.route("/", methods=['GET', 'POST']) def hello(): return {"result": "Hello, this Text2Text at your service."} @app.route('/Indexer/<action>', methods=['POST']) def indexer(action): ...
47
31.55
76
16
373
python
[{"finding_id": "codeql_py/stack-trace-exposure_635669d1904001be_21124820", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 27, 41, 28 ]
[ null, null, null ]
[ 12, 12, 10 ]
[ 30, 30, 51 ]
2024-11-19T02:46:08.369503+00:00
1,560,946,716,000
5c2a21d109e4dc324e62bb960a5641220de4e7f5
3
{ "blob_id": "5c2a21d109e4dc324e62bb960a5641220de4e7f5", "branch_name": "refs/heads/master", "committer_date": 1560946716000, "content_id": "51394e18f4f36f9d572352dda8c9e038525e73f2", "detected_licenses": [ "MIT" ], "directory_id": "c4eed0aed2d425be16cbdf2530e4d379a07a0bb6", "extension": "py", "fi...
2.921875
stackv2
import argparse import json import math from functools import lru_cache from urllib.parse import urlencode from urllib.request import urlopen class AirportService: def __init__(self, longitude, latitude): self.location = MapCoordinate(longitude, latitude) def get_nearest_airports_in_radius(self, rad...
135
38.97
119
17
1,199
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be10785823f928f0_f8d37946", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 125 ]
[ 126 ]
[ 11 ]
[ 58 ]
2024-11-19T02:46:17.434430+00:00
1,591,629,585,000
2cce1bbc8fc032e2437d38653ca2c704c3d0b43c
3
{ "blob_id": "2cce1bbc8fc032e2437d38653ca2c704c3d0b43c", "branch_name": "refs/heads/master", "committer_date": 1591629585000, "content_id": "c7f0e1b4357ef8f26465784378ce3b0638622786", "detected_licenses": [ "MIT" ], "directory_id": "9613e620edca9b1fbf95176b99823c5efd8eeca0", "extension": "py", "fi...
3.234375
stackv2
# -------------- #Header files import pandas as pd import numpy as np import matplotlib.pyplot as plt #path of the data file- path data = pd.read_csv(path) data['Gender'].replace('Agender','-',inplace=True) gender_count = data.Gender.value_counts() print(gender_count) #print(gender_count.value()) plt.bar(gender_count...
59
22.8
55
9
371
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e2012ecac8f03e09_de167751", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 12 ]
[ null ]
[ 7 ]
[ 19 ]
2024-11-19T02:46:21.973191+00:00
1,615,770,945,000
784ce8737d49ea0b70965c3622a44e7b1b0e606d
3
{ "blob_id": "784ce8737d49ea0b70965c3622a44e7b1b0e606d", "branch_name": "refs/heads/main", "committer_date": 1615770945000, "content_id": "e51fd6d924a1f3ab13f9d7d32adc569719674054", "detected_licenses": [ "MIT" ], "directory_id": "259599777731d3da82147fee63a45f7ae1a856c8", "extension": "py", "file...
3.140625
stackv2
entirety = False GenderList = {} ReligionsList = {} PoliticalPartiesList = {} AgesList = {} JobsList = {} runs = 0 def i(j): global runs runs +=1 if runs%5 == 0: print("Data so far") try: print(Percentage) print(GenderList) print(ReligionsList) ...
73
33.63
141
13
633
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_014f8dfbf2d94d0b_7a4a2965", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 16, 73 ]
[ null, null ]
[ 19, 34 ]
[ 29, 54 ]
2024-11-19T02:59:16.104189+00:00
1,485,876,871,000
23b5aa6a4ee863c6903377d076c71faf0ccc2147
3
{ "blob_id": "23b5aa6a4ee863c6903377d076c71faf0ccc2147", "branch_name": "refs/heads/master", "committer_date": 1485876871000, "content_id": "7c48b6f6cfc168ff9304346cb8b30849d8ef83e2", "detected_licenses": [ "MIT" ], "directory_id": "b0f6410c2b8c8d8e6fc186e686fcede14de14703", "extension": "py", "fi...
2.546875
stackv2
""" -*- coding: utf-8 -*- """ from pprint import pprint from python2awscli import bin_aws from python2awscli import must class BaseRDS(object): def __init__(self, name, region, engine, size, username, password, gb, zone, groups, public=True): self.id = None # DbiResourceId self.name = name # DB...
60
38.6
102
13
519
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_818449454da7f20c_c9c3da93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 59 ]
[ null ]
[ 15 ]
[ 44 ]
2024-11-19T02:59:46.678735+00:00
1,666,803,535,000
fa333c86290bb5c9c21062d64d206197f5469670
2
{ "blob_id": "fa333c86290bb5c9c21062d64d206197f5469670", "branch_name": "refs/heads/master", "committer_date": 1666803535000, "content_id": "9d57417b7a923f06622f53be8b340589816070c4", "detected_licenses": [ "MIT" ], "directory_id": "e5bf3b41c8634e9e9d3952a17bb66dc3625e956c", "extension": "py", "fi...
2.3125
stackv2
import urllib2, sys, re from bs4 import BeautifulSoup text = ''.join((x for x in open("provider.coffee"))) urls = set(re.findall("""['"](https://api.tabletopsimulator.com/[^'"]*)['"]""", text)) if False: #this used to transpose urls urls = set(re.findall("""['"](http://berserk-games.com/[^'"]*)['"]""", text)) ...
77
29.36
103
17
582
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_7aab1a39ac08861d_3af6301b", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'tabletopsimulator.com/', so it migh...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'tabletopsimulator.com/', so it might match more hosts than expected." ]
[ 5 ]
[ null ]
[ 31 ]
[ 71 ]
2024-11-19T02:59:52.827149+00:00
1,557,223,405,000
91d13e0d1a65b518ed642073214da9a9ff339e9d
2
{ "blob_id": "91d13e0d1a65b518ed642073214da9a9ff339e9d", "branch_name": "refs/heads/master", "committer_date": 1557223405000, "content_id": "b7ac22a972d213df613e890c756244d7b23f8b46", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7daa78561e9d69e88ba1e0509ecdf35ea8dc2638", "extension": "py"...
2.328125
stackv2
# -*- coding: utf-8 -*- # # Copyright 2017 Ricequant, Inc # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable ...
95
36.89
109
20
836
python
[{"finding_id": "codeql_py/tarslip_a3bf725815b21650_63b476bd", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 92 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T02:59:57.975551+00:00
1,693,739,470,000
cc6ce5464f165a4e9b2d089d1391c25b06110da1
3
{ "blob_id": "cc6ce5464f165a4e9b2d089d1391c25b06110da1", "branch_name": "refs/heads/main", "committer_date": 1693739478000, "content_id": "a7a96ec9223a9bd3df2d6f0a828703b46bfaf0cd", "detected_licenses": [ "MIT" ], "directory_id": "72f37781f43fe688ee6560c6531f0cd90e3dbc93", "extension": "py", "file...
2.671875
stackv2
import os import sys sys.path.append(os.path.realpath(".")) import inquirer # noqa text = inquirer.text(message="Enter your username") print(text) password = (inquirer.password(message="Please enter your password"),) print(password) checkbox = inquirer.checkbox(message="Please define your type of project?", choice...
20
29.6
118
9
133
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f691e1bc9f91d69_684ea741", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 12 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-19T02:59:59.429410+00:00
1,556,652,329,000
f6610ec125362b115a1034fd008fef158459e9f5
2
{ "blob_id": "f6610ec125362b115a1034fd008fef158459e9f5", "branch_name": "refs/heads/master", "committer_date": 1556652329000, "content_id": "86b6e64b355eab05c29cf7537dc96b1c4af8a26d", "detected_licenses": [ "MIT" ], "directory_id": "e0669caf276c10ce2f92f69742e4c3b16f5a4dce", "extension": "py", "fi...
2.40625
stackv2
from todolist import app from flask import session, request, render_template, redirect,url_for import datetime,time,uuid,hashlib from todolist.connection import Connection from todolist.session import mySession sqlCon = Connection() mySession = mySession() @app.before_request def make_session_permanent(): session...
106
28.37
111
17
673
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4a87a894755ecf7c_f8eb8c1d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computational...
[ 37, 61 ]
[ null, null ]
[ 13, 13 ]
[ 53, 53 ]
2024-11-19T03:12:16.830657+00:00
1,544,413,377,000
51ca4f32c74f76267affc1bff4a7273ccd842f01
3
{ "blob_id": "51ca4f32c74f76267affc1bff4a7273ccd842f01", "branch_name": "refs/heads/master", "committer_date": 1544413377000, "content_id": "7ebd07acc3147af6f55f7b9cbf3839d0a12f7b4e", "detected_licenses": [ "MIT" ], "directory_id": "d0c67273eff0f64a89c36b8980fd897e6b438e29", "extension": "py", "fi...
2.703125
stackv2
import sys import numpy as np from PIL import Image import torch import torch.nn as nn import torch.nn.functional as F from train import Network from torch.autograd import Variable from torchvision import transforms, utils import cv2 from train import Network GENDER_MODEL_PATH = "./gender_est_model.pt" RACE_MODEL_P...
77
30.51
125
13
649
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_91f90ab5eaa482ac_208cc912", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 26, 28 ]
[ null, null ]
[ 11, 11 ]
[ 27, 27 ]
2024-11-19T03:24:51.660278+00:00
1,558,372,548,000
2e6eb84c5726b384276a4bbf3176c87b01a571df
4
{ "blob_id": "2e6eb84c5726b384276a4bbf3176c87b01a571df", "branch_name": "refs/heads/master", "committer_date": 1558372548000, "content_id": "0beb2e5d1c6691b977643880569296ac1495c958", "detected_licenses": [ "MIT" ], "directory_id": "73cd7ebe847adf267a3f9d9a5176d1421e1e93b3", "extension": "py", "fi...
3.921875
stackv2
''' Created on Aug 6, 2018 @author: david avalos ''' #import abstract library from abc import abstractmethod, ABC class Employee(ABC): def __init__(self, name, salary): self.name = name self.salary = salary print("Employee", self.name, "created with salary of",self.salary) @a...
53
18.02
74
10
228
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_76a62ce73554a45e_d6379f08", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 14 ]
[ null ]
[ 63 ]
[ 74 ]
2024-11-19T03:24:53.717185+00:00
1,692,107,468,000
ee284899a172a7c1052528aeeb2fd615568cf302
2
{ "blob_id": "ee284899a172a7c1052528aeeb2fd615568cf302", "branch_name": "refs/heads/master", "committer_date": 1692107468000, "content_id": "5fe779edeb706e13e4dec281ec95b79dac1ac836", "detected_licenses": [ "MIT" ], "directory_id": "8454441f899c3beb9fcea26cffc2f4c3cf75ff6a", "extension": "py", "fi...
2.3125
stackv2
import paramiko import datetime import subprocess # run it locally if you want, use this for Bash commands def run_netflow_cmd(command): rwflow_server_ip = "1.2.3.4" # SiLK box user_name="netflow" keyfile="/home/marius/.ssh/id_rsa" ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(par...
26
31.81
81
13
203
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0da05d3b9dbb7e0e_8bf9788c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 11 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T03:35:16.482770+00:00
1,479,106,070,000
faaad29d64cd3d9c5d504e01928e8565ce1922a5
3
{ "blob_id": "faaad29d64cd3d9c5d504e01928e8565ce1922a5", "branch_name": "refs/heads/master", "committer_date": 1479106070000, "content_id": "ec9b711e816a3982c19cf621c5cb272a7cfbcc71", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fc750d8824d4d2c271173c105f1212a336b10896", "extension": "py"...
2.53125
stackv2
#!/usr/bin/python #-*- encoding:utf-8-*- try: from bs4 import BeautifulSoup as BS except ImportError: raise RuntimeError('bs4 is required, May use pip install it.') import os import sys import re import shutil import threading import time import urllib2 #储存路径 DIR = "./userImgs" #下载图片全局变量,dict[filename] ...
183
25.92
151
18
1,489
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_75f4a488e8c9c58e_f277fbef", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'doubanio.com/icon/u', so it might m...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'doubanio.com/icon/u', so it might match more hosts than expected." ]
[ 77 ]
[ null ]
[ 25 ]
[ 66 ]
2024-11-19T01:27:01.904876+00:00
1,516,224,837,000
0a78324dc5686050ef4db0ed8bd1f20d4ad0968a
3
{ "blob_id": "0a78324dc5686050ef4db0ed8bd1f20d4ad0968a", "branch_name": "refs/heads/master", "committer_date": 1516224837000, "content_id": "9e73322360525a391dd78bb656c350bb50eeecf3", "detected_licenses": [ "MIT" ], "directory_id": "f6ab8ac78d54a7cee4253a17ad92595bce3c54af", "extension": "py", "fi...
3.015625
stackv2
""" module containing functions to parse and order ipvX to a country """ import os import random import ipaddress import lzma import zipfile import tarfile import GeoIP as gi def extract_file(args): """ decompresses a file :param args: file obj :return: None """ input_file = args['filename'] ...
148
27.29
93
22
1,042
python
[{"finding_id": "codeql_py/tarslip_3104174b95e9aa7c_3608e150", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 34, 37 ]
[ null, null ]
[ 13, 13 ]
[ 14, 14 ]
2024-11-19T01:38:33.169702+00:00
1,521,092,175,000
c59b3f381a8eba6dfbc601ff0fa5a60162ca1f30
2
{ "blob_id": "c59b3f381a8eba6dfbc601ff0fa5a60162ca1f30", "branch_name": "refs/heads/master", "committer_date": 1521092175000, "content_id": "8360a910a3f494030380a4342d9254e6b7c95c22", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "69fa0436ce6b5d3eb3a17e18ac456813da3158ce", "extension": "p...
2.40625
stackv2
from flask import Flask, jsonify, request, abort import train import solve import threading import json import requests app = Flask(__name__) @app.route('/') def hello_world(): return 'Hello World!' @app.route('/train', methods=['POST']) def post_train(): if not request.json or 'id' not in request.json or ...
75
22.33
82
12
482
python
[{"finding_id": "codeql_py/code-injection_bb027c087a4f9389_febae61e", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-094", "CWE-094" ]
[ "py/code-injection", "py/code-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1).", "This code execution depends on a [user-provided value](1)." ]
[ 23, 44 ]
[ null, null ]
[ 21, 21 ]
[ 45, 45 ]
2024-11-19T01:38:39.045501+00:00
1,476,471,924,000
2c6b783342a822d4db463852a0678517f1539bbe
2
{ "blob_id": "2c6b783342a822d4db463852a0678517f1539bbe", "branch_name": "refs/heads/master", "committer_date": 1476472766000, "content_id": "a295f7aa90763a23bbb8d451d50be24ed933c2ed", "detected_licenses": [ "MIT" ], "directory_id": "bc1497ddd58503c9c33cce838911d88b73a078a8", "extension": "py", "fi...
2.359375
stackv2
# -*- coding: utf-8 -*- """ onboarder ~~~~~~~~ app.views (app) """ import os, json from os.path import abspath import argparse from datetime import datetime import tornado.ioloop import tornado.web import numpy as np from sqlalchemy import create_engine from sqlalchemy.orm import sessionmaker from indis...
162
36.83
153
19
1,333
python
[{"finding_id": "codeql_py/stack-trace-exposure_a26614062f99059f_3ca6c67b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 58, 61, 94, 98 ]
[ null, 63, null, 100 ]
[ 24, 24, 24, 24 ]
[ 53, 15, 53, 15 ]
2024-11-19T01:51:54.164748+00:00
1,621,902,996,000
8c6f6b9c7c728927b0db0966555805adc0bd7f93
3
{ "blob_id": "8c6f6b9c7c728927b0db0966555805adc0bd7f93", "branch_name": "refs/heads/master", "committer_date": 1621902996000, "content_id": "231766d89baeef3999e647ce60317eea04fdfae1", "detected_licenses": [ "MIT" ], "directory_id": "c4f3944d86f9cca33f8b5c2230e3273cbd44b70e", "extension": "py", "fi...
2.59375
stackv2
import socketserver import http.server import logging import cgi from selenium import webdriver PORT = 80 driver = webdriver.Chrome("chromedriver.exe") class ServerHandler(http.server.SimpleHTTPRequestHandler): def do_GET(self): logging.error(self.headers) http.server.SimpleHTTPRequestHandler.do_G...
68
30.85
113
22
471
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_06f8b8c2b97c0bfc_d039372c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-117", "CWE-117" ]
[ "py/clear-text-logging-sensitive-data", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 38, 12, 16 ]
[ null, null, null ]
[ 49, 23, 23 ]
[ 55, 35, 35 ]
2024-11-19T01:52:28.953847+00:00
1,517,849,199,000
3de3e59ee6cf9367d8934fffa08878d324a6662a
3
{ "blob_id": "3de3e59ee6cf9367d8934fffa08878d324a6662a", "branch_name": "refs/heads/master", "committer_date": 1517849199000, "content_id": "7d526725e2e2a8580afb18b130e2ece11a5f3333", "detected_licenses": [ "MIT" ], "directory_id": "754d29c13eedd66cbb4c3e04246de5561ae9012d", "extension": "py", "fi...
2.9375
stackv2
import requests from flask import Flask, render_template, request from textteaser import TextTeaser from bs4 import BeautifulSoup from readability import Document app = Flask(__name__) def summarize_url(url, arc90=False): # arc90 helps us get the content of the article without the comments and shit # used in Saf...
66
28.06
102
13
510
python
[{"finding_id": "codeql_py/full-ssrf_3a0d6f4b91bb2952_0e2b4a6a", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 22 ]
[ null ]
[ 7 ]
[ 24 ]
2024-11-19T01:52:29.567040+00:00
1,523,362,344,000
dce88c58a8449c212b320f568137cccb46605f42
2
{ "blob_id": "dce88c58a8449c212b320f568137cccb46605f42", "branch_name": "refs/heads/master", "committer_date": 1523362344000, "content_id": "f8e9e6dded2335c7db21bbdbea5d6aa77f3368f7", "detected_licenses": [ "MIT" ], "directory_id": "d5bedf2ab61a06497ffe27c166882239b6b38828", "extension": "py", "fi...
2.40625
stackv2
import sys import os import datetime from services import * from geopy.geocoders import Nominatim from terminaltables import AsciiTable sys.path.insert(0, os.path.abspath('..')) from clint.arguments import Args from clint.textui import puts, colored, indent, prompt, validators d_format ='%Y-%m-%d %H:%M:%S' class ...
104
43.79
146
29
960
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9329e80ce3fbc9b3_d103e232", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 81 ]
[ null ]
[ 31 ]
[ 105 ]
2024-11-19T02:04:19.026203+00:00
1,563,371,647,000
04eacec34a5d7bbbafa69836e17ecc8f13c1b635
2
{ "blob_id": "04eacec34a5d7bbbafa69836e17ecc8f13c1b635", "branch_name": "refs/heads/master", "committer_date": 1563371647000, "content_id": "61f3a6c7d196c38112c7565eea315db0ab9a91b0", "detected_licenses": [ "MIT" ], "directory_id": "3725249ab7f1333e91e5b8b678d936dc516f68ea", "extension": "py", "fi...
2.359375
stackv2
import os import json import shutil from jinja2 import Environment, FileSystemLoader curDir = os.path.abspath(os.path.dirname(__file__)) def makeDocs(ctx, dstDir): jinjaEnv = Environment( loader=FileSystemLoader(os.path.join(curDir, "templates")), trim_blocks=True, lstrip_blocks=True, ...
44
37.14
114
16
403
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c80e7f867366246e_9f0fb88e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ 14 ]
[ 16 ]
[ 6 ]
2024-11-19T02:04:25.306258+00:00
1,650,875,990,000
dc008d3b182eb0160a41b151238a7558e78dc202
3
{ "blob_id": "dc008d3b182eb0160a41b151238a7558e78dc202", "branch_name": "refs/heads/master", "committer_date": 1650875990000, "content_id": "d290a969195891acc1e9f8d3aea5cfda4b1405ed", "detected_licenses": [ "BSD-2-Clause-Views", "BSD-2-Clause" ], "directory_id": "2b5cf299bc4cd2d07b30656ebf1b26a4b3...
2.8125
stackv2
"""Export training center XML file (TCX).""" import numpy as np import jinja2 from datetime import datetime class TcxExport: """Export training center XML file (TCX).""" def __init__(self): pass def dumps(self, activity): env = jinja2.Environment( loader=jinja2.PackageLoader("...
35
26.43
64
14
251
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_46f23cbb434e7988_61b413dd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ 14 ]
[ 15 ]
[ 65 ]
2024-11-19T02:28:15.604655+00:00
1,437,687,856,000
a2fa21786ab80141ccccfee7cc62da19669d73eb
3
{ "blob_id": "a2fa21786ab80141ccccfee7cc62da19669d73eb", "branch_name": "refs/heads/master", "committer_date": 1437687856000, "content_id": "497725ac50f7c4e8868d0ff1bf55671f1a70d7f2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "40b9e20473c3fc91b2817a06822990641e52d5de", "extension": "py"...
2.53125
stackv2
"""`main` is the top level module for your Flask application.""" # Import the Flask Framework from flask import Flask from flask import request from slacker import Slacker import json import datetime from secret_keys import SLACK_API_TOKEN, HEADLINE_TOKEN, HEADLINE_CHANNEL app = Flask(__name__) slack = Slacker(SLACK_...
62
38.6
156
15
626
python
[{"finding_id": "codeql_py/reflective-xss_b5b4d08c6fcb49f9_bce5063a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 21, 23 ]
[ null, null ]
[ 16, 16 ]
[ 77, 101 ]
2024-11-19T02:28:20.828782+00:00
1,565,799,624,000
f1972d93ffb5dad29434f57a4eeec5a01ba8bf48
2
{ "blob_id": "f1972d93ffb5dad29434f57a4eeec5a01ba8bf48", "branch_name": "refs/heads/master", "committer_date": 1565799624000, "content_id": "0dfc8712f721aaac783029033809421723079102", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0c930f21df721affa68a217073ec2bfc3d6a38f4", "extension": "py"...
2.34375
stackv2
import pickle import logging import hashlib import numpy as np import os from pathlib import Path import spacy import shutil import sys import tarfile import tempfile import torch from typing import Dict, List sys.path.append("nbsvm") from nltk import word_tokenize from nltk.stem import WordNetLemmatizer from nltk.ste...
236
34.04
107
16
1,996
python
[{"finding_id": "codeql_py/log-injection_23f26014c5b2ce59_75d51b68", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-022" ]
[ "py/log-injection", "py/log-injection", "py/tarslip" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 200, 207, 104 ]
[ null, null, null ]
[ 21, 21, 13 ]
[ 40, 48, 21 ]
2024-11-19T02:28:27.323442+00:00
1,565,234,090,000
f60e2409ed46ffe10198c71d3518d362823d9266
3
{ "blob_id": "f60e2409ed46ffe10198c71d3518d362823d9266", "branch_name": "refs/heads/master", "committer_date": 1565234090000, "content_id": "37dca5f26c9df30d6ec6ba530a652e8cfd014c2c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b78f1dc27dd140aaef6f89747779a2e2e7427d5d", "extension": "py"...
2.640625
stackv2
from bs4 import BeautifulSoup import csv from unidecode import unidecode from activityAnalysis import * import requests def write_activity_to_csv(dic): for title in dic: if title.lower() == 'youtube': write_youtube(dic) elif title.lower() == 'search': write_search(dic) ...
459
34.64
161
26
3,456
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c0c4838bfd769561_571d8e28", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [news.google.com](1) may be at an arbitrary position in...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [news.google.com](1) may be at an arbitrary position in the sanitized URL.", "The string [www.youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 362, 362 ]
[ null, null ]
[ 44, 79 ]
[ 75, 110 ]
2024-11-19T02:28:53.371210+00:00
1,684,830,589,000
62cc2196e6f868dd6d051255b8d60096aaa4fec3
3
{ "blob_id": "62cc2196e6f868dd6d051255b8d60096aaa4fec3", "branch_name": "refs/heads/master", "committer_date": 1684830589000, "content_id": "9e3ec71d21b06a3b2cc2fdbbf7907ed80c870a8e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9b9a146193ac75059a4ea645616e399b5c7518c0", "extension": "py"...
3.015625
stackv2
""" A Scrapper instance is an entity that collects data from the resources. """ import abc import requests import gevent import gevent.monkey import pymongo import pymongo.errors import logging import urllib3 from requests.exceptions import ConnectionError, Timeout, TooManyRedirects from textblob import TextBlob from s...
215
37.85
146
22
1,727
python
[{"finding_id": "codeql_py/request-without-cert-validation_cd6c5275e7f8960c_f90b0147", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 159 ]
[ null ]
[ 32 ]
[ 63 ]
2024-11-19T02:36:44.833567+00:00
1,480,959,145,000
1b447d1ade2b79cf22c3fc7cdd8d805c6da34e18
3
{ "blob_id": "1b447d1ade2b79cf22c3fc7cdd8d805c6da34e18", "branch_name": "refs/heads/master", "committer_date": 1480959145000, "content_id": "5339ffc32e562e4f6bc6dcb27a99b1c14e193470", "detected_licenses": [ "MIT" ], "directory_id": "009de54196cb8c8dc1403287fe2b35a98c2e1c74", "extension": "py", "fi...
2.765625
stackv2
from base64 import b64encode, b64decode from binascii import hexlify from pathlib import Path from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes from cryptography.hazmat.backends import default_backend from typing import Sequence import os current_dir = str(Path(__file__).parent) hex_to_byte...
51
27.1
76
12
365
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_d3b5dac4d605efd9_c42f23df", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 34, 42 ]
[ null, null ]
[ 11, 11 ]
[ 39, 38 ]
2024-11-19T02:36:45.531970+00:00
1,691,667,291,000
55266be94b6ff895621315d4195e5013042907c5
2
{ "blob_id": "55266be94b6ff895621315d4195e5013042907c5", "branch_name": "refs/heads/master", "committer_date": 1691667291000, "content_id": "744b66d8d743243dab41d9d882c50e13c24a566c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5adddcc7d2e86f8e773c2e2ceb0c49d99dd0a23c", "extension": "py"...
2.453125
stackv2
# Copyright © 2023 Ory Corp # SPDX-License-Identifier: Apache-2.0 from flask import Flask, request, jsonify import requests import os # load google cloud logging if running on GCP if os.getenv('ENABLE_CLOUD_LOGGING', ''): # set up the Google Cloud Logging python client library import google.cloud.logging ...
96
31.11
88
17
759
python
[{"finding_id": "codeql_py/stack-trace-exposure_55834e664a357abf_8fb472d0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
5
true
[ "CWE-209", "CWE-312", "CWE-918", "CWE-117", "CWE-117" ]
[ "py/stack-trace-exposure", "py/clear-text-logging-sensitive-data", "py/partial-ssrf", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expressio...
[ 54, 68, 86, 44, 68 ]
[ null, null, null, null, null ]
[ 24, 22, 16, 18, 22 ]
[ 79, 59, 46, 36, 59 ]
2024-11-19T02:37:08.151153+00:00
1,554,003,541,000
a9fb357aae7a3085feb923c6e2d9932a0b31568d
4
{ "blob_id": "a9fb357aae7a3085feb923c6e2d9932a0b31568d", "branch_name": "refs/heads/master", "committer_date": 1554003541000, "content_id": "8a2a89dfe2b13a762a4b2feacb810cccecc5670b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c9f8da2afef52eca81b75d2ba6028e098a1c25b1", "extension": "py"...
3.859375
stackv2
''' https://www.hackerrank.com/challenges/the-birthday-bar/submissions/code/102134070 Function Description Complete the birthday function in the editor below. It should return an integer denoting the number of ways Lily can divide the chocolate bar. birthday has the following parameter(s): s: an array of integers, ...
79
19
142
16
443
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d2d2d7414d8d4afc_feeefc49", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 57 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-19T02:37:22.834277+00:00
1,582,863,713,000
4ae233b483192859c331110c6c5626e13b968ec9
3
{ "blob_id": "4ae233b483192859c331110c6c5626e13b968ec9", "branch_name": "refs/heads/master", "committer_date": 1582863713000, "content_id": "7310c31c20c447bd8a6e1902bcd892eb60c77b8e", "detected_licenses": [ "MIT" ], "directory_id": "801ccabc3294eba22e1c7296e632e5d3e49a5cfa", "extension": "py", "fi...
2.515625
stackv2
from flask import Flask, render_template from flask import jsonify from flask import request from SentimentNet import SentimentAnalyzer SN = SentimentAnalyzer(cuda=False) app = Flask(__name__) @app.route("/sentiment", methods=['GET','POST']) def sentiment(): if request.method=="GET": sent = request.args.g...
23
27.22
48
13
159
python
[{"finding_id": "codeql_py/flask-debug_a139b7a02ef4fba4_0704d96f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 23, 20 ]
[ null, null ]
[ 5, 16 ]
[ 49, 43 ]
2024-11-19T02:37:38.753823+00:00
1,632,563,111,000
f7a420a00e7468317b87b3b0e9466f06345332b4
3
{ "blob_id": "f7a420a00e7468317b87b3b0e9466f06345332b4", "branch_name": "refs/heads/master", "committer_date": 1632563111000, "content_id": "47fb11c47d69b3cf165c2a5165a2e51618955278", "detected_licenses": [ "MIT" ], "directory_id": "0b40a67331654b85a6bdf6c027b387c4f2d3bc4f", "extension": "py", "fi...
2.703125
stackv2
import os import glob import datetime from flask import Flask, render_template, redirect, send_from_directory from pathlib import Path from thumbnail import create_thumb base_path = "/media" thumb_path = os.path.join(base_path, ".thumb") Path(thumb_path).mkdir(parents=True, exist_ok=True) app = Flask(__name__) def _...
113
29.35
88
16
882
python
[{"finding_id": "codeql_py/reflective-xss_65f3c2c6876e78ea_11b16460", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 92, 97 ]
[ null, null ]
[ 12, 15 ]
[ 51, 17 ]
2024-11-19T02:49:20.664197+00:00
1,547,708,953,000
f08e927b729837427958a068b71925f8dc98556e
2
{ "blob_id": "f08e927b729837427958a068b71925f8dc98556e", "branch_name": "refs/heads/master", "committer_date": 1547708953000, "content_id": "7004d83b1155b054c903641e97cd95bc67ca610e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9bae0ecb6846cf85e5fa561c4fd829cf0c97904a", "extension": "py"...
2.359375
stackv2
#-*- coding:utf-8 -*- #from googletrans import Translator import os import _thread import shutil import http.client import hashlib import urllib import urllib.request import random import json import multiprocessing import sys typ = sys.getfilesystemencoding() # reload(sys) # sys.setdefaultencoding( "utf-8" ) # # tr...
178
31.6
153
21
1,434
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_25b1bd2f1e320119_96c42320", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 41 ]
[ null ]
[ 15 ]
[ 44 ]
2024-11-19T02:49:21.512560+00:00
1,615,217,680,000
1d4f184d4309bcbe2cbdaa81eb3b23cf0264dd13
3
{ "blob_id": "1d4f184d4309bcbe2cbdaa81eb3b23cf0264dd13", "branch_name": "refs/heads/main", "committer_date": 1615217680000, "content_id": "36ff9491ce6f0d4be07656205f1d2cab4d5a9f30", "detected_licenses": [ "MIT" ], "directory_id": "d77104b7bf6c1f955710cd432d1c3f3088763180", "extension": "py", "file...
2.609375
stackv2
import tkinter as tk from tkinter import Message, ttk import json import hashlib import datetime import random from tkinter import messagebox from tkinter.font import names def now(): dt = datetime.datetime.now() return dt.strftime("%Y-%m-%d %H:%M:%S") def sha(password): hash = hashlib.sha1(password.enc...
244
40
120
18
2,645
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3ce0f9ae495c7cda_d2b5084b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 17 ]
[ null ]
[ 25 ]
[ 49 ]
2024-11-19T03:00:22.914759+00:00
1,693,585,381,000
3e3a1eb075d45db485f8e164e22aada96a5207a3
3
{ "blob_id": "3e3a1eb075d45db485f8e164e22aada96a5207a3", "branch_name": "refs/heads/main", "committer_date": 1693585381000, "content_id": "491d6d7066b2866874df467daaea3ea94bb29f1c", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "d51f530078404a24f1844b53b037bbfed238a784", "extensi...
2.625
stackv2
# Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. # SPDX-License-Identifier: Apache-2.0 """ Purpose Shows how to implement an AWS Lambda function that uses AWS IoT Greengrass Core SDK to get a secret. """ # snippet-start:[greengrass.python.secret-resource-access.complete] import greengrasssdk sec...
31
33.71
87
10
248
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc2b6f0659a2bec6_c32f75c5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 30 ]
[ null ]
[ 11 ]
[ 34 ]
2024-11-19T03:00:25.423787+00:00
1,547,730,615,000
4a6fe359f89700c8253ab9173e79d67ed31cf68e
3
{ "blob_id": "4a6fe359f89700c8253ab9173e79d67ed31cf68e", "branch_name": "refs/heads/master", "committer_date": 1547730615000, "content_id": "0ad3fd00ea9e078218b0e8b4dbef307b5c9fa0ba", "detected_licenses": [ "MIT" ], "directory_id": "bd4a20f6f24d1797acc85050a41f29ea337ea500", "extension": "py", "fi...
2.734375
stackv2
# -*- coding: utf-8 -*- """ A routing layer for the RDocumentation bot, heavily inspired by the Python [onboarding bot tutorial](https://github.com/slackapi/Slack-Python-Onboarding-Tutorial) """ import json import bot import re from flask import Flask, request, make_response, render_template import sys pyBot = bot.Bot...
129
39.75
95
24
1,108
python
[{"finding_id": "codeql_py/flask-debug_9a3803d9b908d6b9_4a5af538", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 129, 67, 106, 116 ]
[ null, null, null, null ]
[ 5, 26, 30, 23 ]
[ 24, 33, 54, 30 ]
2024-11-19T03:11:21.296862+00:00
1,539,161,942,000
d865bd2a782c51f4e8c89c10acf09e79ab47edbd
3
{ "blob_id": "d865bd2a782c51f4e8c89c10acf09e79ab47edbd", "branch_name": "refs/heads/master", "committer_date": 1539161942000, "content_id": "3c5785371e439e22ac8e0f5da635fd270704c6fa", "detected_licenses": [ "MIT" ], "directory_id": "be458fdbec0c36f91de7c0aa4c1f7e80dcc27f28", "extension": "py", "fi...
2.515625
stackv2
import os from yaml import load from jinja2 import Template from napalm_base import get_network_driver from pprint import pprint inventory_f=open('python_inventory.yml', 'r') inventory_s=inventory_f.read() inventory_f.close() python_inventory=load(inventory_s) f=open('validate.j2') s=f.read() f.close() validate_templ...
118
31.69
151
14
855
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_039e2a8c0d3edd58_7fbe93a2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ null ]
[ 19 ]
[ 30 ]
2024-11-19T03:11:32.334885+00:00
1,490,938,492,000
e3c532bdd95de5eb3553b9f06ec3a28fee48a477
2
{ "blob_id": "e3c532bdd95de5eb3553b9f06ec3a28fee48a477", "branch_name": "refs/heads/master", "committer_date": 1490938492000, "content_id": "b1a31e04d47f6d68b068910c2a1aab377ea81915", "detected_licenses": [ "MIT" ], "directory_id": "3f10e950e89411a0ba1379d29a8853c54b15883f", "extension": "py", "fi...
2.375
stackv2
# Copyright (c) Microsoft. All rights reserved. Licensed under the MIT license. # See LICENSE in the project root for license information. import requests import uuid import json from connect.data import get_email_text from collections import Counter from collections import OrderedDict from flask import request # The...
207
31.59
115
18
1,573
python
[{"finding_id": "codeql_py/request-without-cert-validation_89df4d184f6a55ca_a238ba44", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 43, 102, 140, 201 ]
[ null, null, null, null ]
[ 16, 16, 16, 16 ]
[ 83, 114, 113, 116 ]
2024-11-19T03:12:13.678665+00:00
1,552,304,249,000
cfacb6223a40abe48d2b1c7fb43e0b89d12c01a0
2
{ "blob_id": "cfacb6223a40abe48d2b1c7fb43e0b89d12c01a0", "branch_name": "refs/heads/master", "committer_date": 1552304249000, "content_id": "fd27df6be15a72f7c5544a7e4aff906e644c7d93", "detected_licenses": [ "MIT" ], "directory_id": "872f3d0a47f8a63f620e41a9da82820e451e4c51", "extension": "py", "fi...
2.5
stackv2
import os import shutil import stat from abc import abstractmethod from tempfile import TemporaryDirectory import click from git import Git, Repo from jinja2 import Template class BaseCommand: @abstractmethod def run(self): pass class InitprojectCommand(BaseCommand): PROJECT_KEY_NAME = 'projec...
79
39.44
99
19
622
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_042a88fb3cbf267e_286667ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 54 ]
[ null ]
[ 28 ]
[ 45 ]
2024-11-19T03:12:16.414649+00:00
1,587,904,803,000
eba897e0b236c1cc7c6e6407a50a1616d1c3197f
3
{ "blob_id": "eba897e0b236c1cc7c6e6407a50a1616d1c3197f", "branch_name": "refs/heads/master", "committer_date": 1587904803000, "content_id": "557f6b604058fd2c888cbc2fc52a6c55f5ef8f00", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5847263d7fcbe0b76c039be9bbdbae6f55176d81", "extension": "py"...
2.734375
stackv2
import pickle import json from nltk.tokenize import word_tokenize from nltk.tag import pos_tag from nltk.stem.wordnet import WordNetLemmatizer from nltk.corpus import stopwords import re import string import scholarly SUBJECT_STRING = 'Iran nuclear deal' def remove_noise(tweet_tokens, stop_words=()): cleaned_to...
75
31.91
122
17
565
python
[{"finding_id": "codeql_py/overly-large-range_95e389d9297492d3_58148246", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 18 ]
[ null ]
[ 55 ]
[ 59 ]
2024-11-19T03:12:29.323843+00:00
1,570,632,696,000
8e5048efc3afe3f6c6ce7bb16768bdbeb7a509f3
3
{ "blob_id": "8e5048efc3afe3f6c6ce7bb16768bdbeb7a509f3", "branch_name": "refs/heads/master", "committer_date": 1570632696000, "content_id": "f58d4af6a53b1c5f7761a8189bf3dba3fec34c8d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "631ff7c9cd31f2ff2ec772ddd5e4c2dbb3982b36", "extension": "py"...
2.765625
stackv2
# -*- coding: utf-8 -*- ## --------------------------------------------------------------------------- ## Copyright 2019 Dynatrace LLC ## ## Licensed under the Apache License, Version 2.0 (the "License"); ## you may not use this file except in compliance with the License. ## You may obtain a copy of the License at ## #...
145
35.85
84
15
1,180
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6d98785011014749_f471c4bf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 128, 134 ]
[ null, null ]
[ 27, 27 ]
[ 78, 77 ]
2024-11-19T03:12:41.761495+00:00
1,682,077,038,000
28da0c960c52b71b45643dbee9a3a1961defcd0b
3
{ "blob_id": "28da0c960c52b71b45643dbee9a3a1961defcd0b", "branch_name": "refs/heads/master", "committer_date": 1682077038000, "content_id": "9d90550a400c4c19935208280ed2a05689ce5224", "detected_licenses": [ "MIT" ], "directory_id": "7bfbc82845f91a0bf9e56bf4226ea0d445a4e4f8", "extension": "py", "fi...
2.78125
stackv2
# -*- coding: utf-8 -*- """ @file @brief Helpers for :epkg:`Flask`. """ import ctypes import traceback import threading from flask import Response def Text2Response(text): """ Converts a text into plain text. @param text text to convert @return textReponse """ retu...
81
27.84
104
12
538
python
[{"finding_id": "codeql_py/stack-trace-exposure_68651bbff8553f2a_ffc13854", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 19 ]
[ null ]
[ 21 ]
[ 25 ]
2024-11-19T03:12:44.138462+00:00
1,429,623,089,000
9e7faac8c5b8497420db02922e46bb8b8809b9b0
3
{ "blob_id": "9e7faac8c5b8497420db02922e46bb8b8809b9b0", "branch_name": "refs/heads/master", "committer_date": 1429623089000, "content_id": "7f3679e3d72d8644bd636b2b4aa4df9785fb7fa7", "detected_licenses": [ "MIT" ], "directory_id": "03b24442f28fd1ef0e6335038c9cc0736d7500c1", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python from __future__ import print_function import sys import os import random import string from boto.kms.exceptions import NotFoundException from boto.kms import connect_to_region from base64 import b64encode PASSWORD_LENGTH = 128 def main(): if 'KMS_KEY_ID' not in os.environ: print(...
50
29.7
93
15
361
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b66052d9471067c3_ae9e03a2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 41 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-19T03:12:47.664085+00:00
1,612,185,931,000
aad99a87f0d4272faa6eae3f5c2964259792f49e
3
{ "blob_id": "aad99a87f0d4272faa6eae3f5c2964259792f49e", "branch_name": "refs/heads/main", "committer_date": 1612185931000, "content_id": "8f3559cf5f993208f4ae40e93fdfd7da7ad466b3", "detected_licenses": [ "MIT" ], "directory_id": "e3b15840aa0c024c43dec0ebcd23e7440a6aceef", "extension": "py", "file...
2.609375
stackv2
import argparse import re from pathlib import Path from typing import Generator from typing import Optional from typing import Sequence from typing import Set from typing import Tuple from pre_commit_dbt.utils import add_filenames_args REGEX_COMMENTS = r"(/\*([^*]|[\r\n]|(\*+([^*/]|[\r\n])))*\*+/|[ \t]*--.*)" REGEX_S...
78
27.53
88
14
559
python
[{"finding_id": "codeql_py/redos_2f3c7cd1e779587d_16be4cc2", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '/**' and containing many repetiti...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '/**' and containing many repetitions of '\\n*'.", "This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitions of '\\n'." ]
[ 12, 12 ]
[ null, null ]
[ 41, 24 ]
[ 55, 58 ]
2024-11-19T03:12:55.538183+00:00
1,616,228,478,000
bf901b0561e86e3bc393e862fbf041e195f80adc
3
{ "blob_id": "bf901b0561e86e3bc393e862fbf041e195f80adc", "branch_name": "refs/heads/master", "committer_date": 1616228478000, "content_id": "675bfb010e554a5248a7d94601184211a913e37e", "detected_licenses": [ "MIT" ], "directory_id": "8bab0bc3808712bac1c1fb5c60543353cdfcd827", "extension": "py", "fi...
2.765625
stackv2
"""Github OAuth authentication""" import json import urllib.request, urllib.parse, urllib.error import httplib2 import os from flask import request, \ session as login_session, \ flash, \ redirect, \ url_for from pemoi import app from .pmoi_auth...
96
39.92
98
16
919
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7f3a18b631c27372_1b486ae3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 39 ]
[ null ]
[ 11 ]
[ 80 ]
2024-11-19T03:35:47.349008+00:00
1,428,447,357,000
0b4dddbbf9bc6d69729e9b76f14de0b212fba3ff
3
{ "blob_id": "0b4dddbbf9bc6d69729e9b76f14de0b212fba3ff", "branch_name": "refs/heads/master", "committer_date": 1428447357000, "content_id": "aaf31c5f9c356095fc9ffb8dd670204b3642b1fe", "detected_licenses": [ "MIT" ], "directory_id": "4855eab2c4c5b832a7e73364026455caaad49e2c", "extension": "py", "fi...
2.921875
stackv2
from jinja2 import Environment, FileSystemLoader from collections import defaultdict import glob import os credits = "" print "Getting lines..." with open(os.path.expanduser("~\\Documents\\GitHub\\TheLegendofAdlez\\Credits.txt"), "r") as creditsfile: credits = creditsfile.read() lines = [] for line in credits....
161
29.86
171
26
1,383
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3c38e9d374ddbfe5_ae9cd41e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 115 ]
[ null ]
[ 7 ]
[ 56 ]
2024-11-19T03:36:00.611733+00:00
1,565,183,620,000
531a57f321c21fff6925022b2290d0e3c0e977d2
3
{ "blob_id": "531a57f321c21fff6925022b2290d0e3c0e977d2", "branch_name": "refs/heads/master", "committer_date": 1565183620000, "content_id": "e11324934bbf09967e1a49322643006a0e997592", "detected_licenses": [ "MIT" ], "directory_id": "8fe2af32a03703f10ec12fee1c422814909760e2", "extension": "py", "fi...
2.5625
stackv2
import sqlite3 import utils from flask import Flask from flask import make_response app = Flask(__name__) def return_link(title, pdf_loc): link_text = "View " + title + " PDF" print(title) link_location = "\'http://127.0.0.1:5000/%s\'" % (pdf_loc + title) link = "<a href=" + link_location + " target...
103
27.95
114
11
930
python
[{"finding_id": "codeql_py/path-injection_598dde4fc096e961_a2913efa", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 86 ]
[ null ]
[ 21 ]
[ 34 ]
2024-11-19T01:28:58.365378+00:00
1,460,139,412,000
f8afcebcd256e6e4fe81509f0df9410810ca8917
2
{ "blob_id": "f8afcebcd256e6e4fe81509f0df9410810ca8917", "branch_name": "refs/heads/master", "committer_date": 1460139412000, "content_id": "cf26798239fece86ad2ebc2bf7b4d599812c98ed", "detected_licenses": [ "BSD-3-Clause", "BSD-2-Clause-Views", "BSD-2-Clause", "MIT" ], "directory_id": "761...
2.359375
stackv2
# -*- coding: utf-8 -*- """ :mod:`h.buildext` is a utility to build the Hypothesis browser extensions. It is exposed as the command-line utility hypothesis-buildext. """ from __future__ import print_function import argparse import codecs import json import logging import os import os.path import shutil import sys fr...
273
31.44
86
14
1,959
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_019533dc33c3e0cd_84f3f50c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 13 ]
[ 63 ]
2024-11-19T01:29:20.788910+00:00
1,591,456,474,000
2e17cce315eae0be2f8440db6bc22650f890ad46
3
{ "blob_id": "2e17cce315eae0be2f8440db6bc22650f890ad46", "branch_name": "refs/heads/master", "committer_date": 1591456474000, "content_id": "2a96db140b67c0258e86b451c8cc95c1104dbeaf", "detected_licenses": [ "MIT" ], "directory_id": "5516d8f8864e7bccb0ddd67bc40dcdc96c864f71", "extension": "py", "fi...
2.640625
stackv2
from flask import Blueprint, render_template, redirect, url_for, request, flash #import rabbitmq auth = Blueprint('auth', __name__) from flask_login import login_user, logout_user, login_required from werkzeug.security import generate_password_hash, check_password_hash from flask import render_template, flash, redirect...
88
31.55
108
13
683
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_21ca0864ad15e965_11e65bad", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 27, 61 ]
[ null, null ]
[ 29, 29 ]
[ 46, 46 ]
2024-11-19T01:29:26.990919+00:00
1,501,176,654,000
cc5b123aa7cfc37c0af9fb7ef5f664695d3174ba
3
{ "blob_id": "cc5b123aa7cfc37c0af9fb7ef5f664695d3174ba", "branch_name": "refs/heads/master", "committer_date": 1501176654000, "content_id": "68e8b4e50a754e5b6d8dc7667c56d9db88e57b0b", "detected_licenses": [ "MIT" ], "directory_id": "0c6b7c6634c8ba94348a464b273105c23c942c6d", "extension": "py", "fi...
2.65625
stackv2
# -*- coding: utf-8 -*- import hashlib import logging import xml.etree.cElementTree as ET ACCOUNT_FILE = 'storj_account_conf.xml' class AccountManager: __logger = logging.getLogger('%s.AccountManager' % __name__) def __init__(self, login_email=None, password=None): self.login_email = login_email...
77
29.96
78
17
498
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d1e1182c95241a88_d34be634", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 26 ]
[ null ]
[ 32 ]
[ 61 ]
2024-11-19T01:29:30.022065+00:00
1,586,354,446,000
37cd3d958722bb3dd61bd93bf72a820b17fa4487
3
{ "blob_id": "37cd3d958722bb3dd61bd93bf72a820b17fa4487", "branch_name": "refs/heads/master", "committer_date": 1586354446000, "content_id": "a5e5eaf57ebd4225a6240ce9c17e18a3d7094023", "detected_licenses": [ "MIT" ], "directory_id": "79301a8c17f46924c45838c4c2496e7e898d9a5a", "extension": "py", "fi...
2.71875
stackv2
import requests from dnac_config import DNAC_IP, DNAC_PORT, DNAC_USER, DNAC_PASSWORD from DNA_Token import get_auth_token def get_device_list(): """Building out function to retrieve list of devices. Using requests.get to make a call to the network device Endpoint""" token = get_auth_token() # Get Token ur...
55
42.02
141
13
648
python
[{"finding_id": "codeql_py/request-without-cert-validation_c6072ebff8dced3b_d1aeb4ba", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 11, 20, 30 ]
[ null, null, null ]
[ 12, 10, 12 ]
[ 56, 74, 56 ]
2024-11-19T01:29:31.735192+00:00
1,452,847,350,000
a3fd777854eb7601447a868bf02e009d24e3058a
3
{ "blob_id": "a3fd777854eb7601447a868bf02e009d24e3058a", "branch_name": "refs/heads/master", "committer_date": 1452847350000, "content_id": "acfd4fd226313fc4f501f6bd52af6f7d37be5c42", "detected_licenses": [ "MIT" ], "directory_id": "541559405ada4e7a52e6aa0fbc3cdc1a42d1b9ee", "extension": "py", "fi...
3.0625
stackv2
""" install.py This file let users to set up machineInfo.config and ojdatabase.config file """ from bash import bash def set_MachineInfo(): bash('test -d machineInfo.config && rm -r machineInfo.config') num = raw_input("Please input the total number of the judges:\n") if num > 0: try: ...
40
35.55
77
19
357
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b6219b93351e54c0_320a1a42", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 32 ]
[ null ]
[ 21 ]
[ 48 ]
2024-11-19T01:29:50.339873+00:00
1,621,623,703,000
2801afb471240bd6febc6e03ad6d1515acadd856
2
{ "blob_id": "2801afb471240bd6febc6e03ad6d1515acadd856", "branch_name": "refs/heads/master", "committer_date": 1621623703000, "content_id": "a9754cb8309c7210b6247711578c86e9ee7b48a6", "detected_licenses": [ "MIT" ], "directory_id": "540ecc97c1f7aef6edef070db35c1a9b19941fe7", "extension": "py", "fi...
2.453125
stackv2
""" Alex Eidt Runs the Flask Application for the UW Course Planner Web App. """ import re import json import os import uwtools import pandas as pd from create_tree import create_tree, graph_department from schedule import get_combinations from schedule import main as check_schedules from flask import Flask, redirect...
255
32.67
100
22
1,953
python
[{"finding_id": "codeql_py/polynomial-redos_4434b6a9cb1b3a05_445b8cfa", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/polynomial-redos", "py/polynomial-redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of ' '.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'A'." ]
[ 114, 196 ]
[ null, null ]
[ 42, 36 ]
[ 48, 46 ]
2024-11-19T01:29:55.776011+00:00
1,628,315,275,000
d9794c8058795cf84cd2d2877caf1db780ef1136
3
{ "blob_id": "d9794c8058795cf84cd2d2877caf1db780ef1136", "branch_name": "refs/heads/master", "committer_date": 1628315275000, "content_id": "b61747c433997555255a539c1356cfb7137783f2", "detected_licenses": [ "MIT" ], "directory_id": "c5bea4b013e426e16829579fcc6f22371facd82b", "extension": "py", "fi...
3
stackv2
# -*- coding: utf-8 -*- """mimerender example for Flask. Run this server and then try: $ curl -iH "Accept: application/html" localhost:8080/x ... Content-Type: text/html ... <html><body>Hello, x!</body></html> $ curl -iH "Accept: application/xml" localhost:8080/x ... Content-Type: appl...
53
21.83
86
11
342
python
[{"finding_id": "codeql_py/reflective-xss_8eb67578aa441949_c63f7584", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 49 ]
[ null ]
[ 12 ]
[ 47 ]
2024-11-19T01:30:09.247493+00:00
1,529,367,668,000
091206ac4585c2add4674c5cbe074f7f3a4f1631
2
{ "blob_id": "091206ac4585c2add4674c5cbe074f7f3a4f1631", "branch_name": "refs/heads/master", "committer_date": 1529367668000, "content_id": "e6f0b81dadc6b1e210042a370ac138b2368e480c", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "b262b4cfaf48c2fc817b4590b64760dc027886f7", "exten...
2.3125
stackv2
import base64, json, sqlite3, ssl, urllib, urllib2, requests dbPath='/opt/sweetsecurity/server/SweetSecurity.db' def getCreds(): creds={'user': None, 'pass': None} conn = sqlite3.connect(dbPath) c = conn.cursor() for httpUserData in c.execute('SELECT * from configuration where object = "webUser"'): creds['user'...
31
32.74
87
12
268
python
[{"finding_id": "codeql_py/request-without-cert-validation_f7c64adfe7142518_b2ae28e1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 28, 30 ]
[ null, null ]
[ 9, 11 ]
[ 43, 78 ]
2024-11-19T01:30:12.700582+00:00
1,683,873,005,000
3c13a036ada0eea6a632c9ac6925a132d528e09a
3
{ "blob_id": "3c13a036ada0eea6a632c9ac6925a132d528e09a", "branch_name": "refs/heads/master", "committer_date": 1683873005000, "content_id": "9ee0259bf3a482878a323ccbe92bb7a6fc588c96", "detected_licenses": [ "Apache-2.0" ], "directory_id": "929cbe87319d7a5bb1d691074fde2a9b6b48cec7", "extension": "py"...
2.625
stackv2
import requests import json from .base import BaseExtractor from ...models import DocumentEntity, Entity, Utterance, DocumentTaxonomy import logging log = logging.getLogger(__name__) class CalaisExtractor(BaseExtractor): """ Use the OpenCalais API to extract entities and other useful goodies from a document...
160
30.29
111
19
1,087
python
[{"finding_id": "codeql_py/request-without-cert-validation_9bcfc3852dc499ed_340ac42e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 97 ]
[ 104 ]
[ 19 ]
[ 33 ]
2024-11-19T01:30:22.851703+00:00
1,648,580,279,000
2b7f2ccb300d0bb442a806de61ebe3ca8e0f811b
2
{ "blob_id": "2b7f2ccb300d0bb442a806de61ebe3ca8e0f811b", "branch_name": "refs/heads/master", "committer_date": 1648580279000, "content_id": "d26a82c5176580f79d7693682bf7c5e5a9a1e229", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2a1b9c3ca8a48c283c5261ff9c283a8172de750f", "extension": "py"...
2.359375
stackv2
# -*- coding: utf-8 -*- # # Copyright 2012-2015 Spotify AB # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law...
161
33.09
99
23
1,369
python
[{"finding_id": "codeql_py/overly-permissive-file_c3b5f4280cab7ad0_bc14155f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 108 ]
[ null ]
[ 9 ]
[ 33 ]
2024-11-19T01:30:37.249767+00:00
1,431,101,619,000
2e326bfa33ad87cfb74e2e2f60fba57f0fd13b56
3
{ "blob_id": "2e326bfa33ad87cfb74e2e2f60fba57f0fd13b56", "branch_name": "refs/heads/master", "committer_date": 1431101619000, "content_id": "00c0efd09f160905c42f7d5d15cf75c702dce747", "detected_licenses": [ "MIT" ], "directory_id": "07e584ae13b64c350263a37f078d5229e9e378fb", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/python """ Pushover API module and command line tool """ from urllib2 import Request, HTTPError, URLError, build_opener, ProxyBasicAuthHandler, ProxyHandler, install_opener from urllib import urlencode from json import loads from argparse import ArgumentParser from ConfigParser import ConfigParser, Error as ...
240
35.52
122
19
1,907
python
[{"finding_id": "codeql_py/overly-large-range_8fcb84d26c2c5a08_18f18808", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 105 ]
[ null ]
[ 73 ]
[ 76 ]
2024-11-19T01:54:52.179910+00:00
1,625,718,140,000
3514250c000512b0cb611efc6b4d9e0581d56523
4
{ "blob_id": "3514250c000512b0cb611efc6b4d9e0581d56523", "branch_name": "refs/heads/main", "committer_date": 1625718140000, "content_id": "d38cae0bdea8fe170ee0510fae2066f52ebcdc1e", "detected_licenses": [ "MIT" ], "directory_id": "5f8035fbabc92bca96b387ba6c12bc7657becd69", "extension": "py", "file...
4.15625
stackv2
# Password generator program import random def generate_password(): capital_letters = ['A','B','C','D','E','F','G','H','I','J','K','L','M','N','O','P','Q','R','S','T','U','V','W','X','Y','Z'] lowercase = ['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v','w','x','y','z'] ...
28
30.57
127
10
278
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f448309d61b37751_36c4abad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 24 ]
[ null ]
[ 11 ]
[ 46 ]
2024-11-19T01:55:23.733037+00:00
1,617,538,893,000
367884b6ed758f7ea5696d6e24dfc7a5fe0f2539
3
{ "blob_id": "367884b6ed758f7ea5696d6e24dfc7a5fe0f2539", "branch_name": "refs/heads/main", "committer_date": 1617538893000, "content_id": "4c8e82977a1392cabf522dd1025a64705bbd4007", "detected_licenses": [ "Unlicense" ], "directory_id": "f455faf7ea663f52f57a8611a7663193d4defbea", "extension": "py", ...
2.859375
stackv2
#!/usr/bin/env python2 import os import socket import ssl import urllib2 from collections import defaultdict from textwrap import dedent class OnamaeDDNSError(Exception): """Error in the interaction with DDNS server. Note that the server may response with error due to the previous command. This class...
124
25.25
80
14
816
python
[{"finding_id": "codeql_py/insecure-default-protocol_e58b76d82d2e617c_7afbd6cd", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 94 ]
[ null ]
[ 19 ]
[ 40 ]
2024-11-19T01:55:24.005999+00:00
1,566,452,419,000
8ace170b0e203dc058958d8dcbcfcbb7cf8824f7
3
{ "blob_id": "8ace170b0e203dc058958d8dcbcfcbb7cf8824f7", "branch_name": "refs/heads/master", "committer_date": 1566452419000, "content_id": "a6e2a3a9dd7f98f6a7731524d7e87ec88ec53921", "detected_licenses": [ "MIT" ], "directory_id": "11193c6bfaf16ca8c764ddfc146541ca755d1210", "extension": "py", "fi...
2.71875
stackv2
import hashlib from binascii import hexlify, unhexlify import sys from .account import PrivateKey from .base58 import Base58, base58decode import logging log = logging.getLogger(__name__) try: from Crypto.Cipher import AES except ImportError: raise ImportError("Missing dependency: pycrypto") SCRYPT_MODULE = N...
119
33.97
87
15
1,235
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_0cfa912e85cd91b7_34441dfe", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 41, 106, 107 ]
[ null, null, null ]
[ 12, 22, 22 ]
[ 26, 49, 49 ]
2024-11-19T02:06:41.350579+00:00
1,540,222,734,000
d7cdba6e0cf7d39183b0ea347c07ca0be2578c90
3
{ "blob_id": "d7cdba6e0cf7d39183b0ea347c07ca0be2578c90", "branch_name": "refs/heads/master", "committer_date": 1540222734000, "content_id": "cfb1c573b830cb966bcdd83905d2083f3c68be70", "detected_licenses": [ "MIT" ], "directory_id": "a301b63c8f905f077c4f714b5cb0e2eb5425af77", "extension": "py", "fi...
2.6875
stackv2
import discord import re import urllib.parse as urlparse import clashroyale creditIcon = "https://i.imgur.com/TP8GXZb.png" credits = "Bot by GR8 | Titan" class friendlink: """Automatically convert Clash Royale friend links to beautiful embeds""" def __init__(self, bot): self.bot = bot self.r...
77
36.27
137
19
666
python
[{"finding_id": "codeql_py/overly-large-range_36682e530319e26c_e3e7b875", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 29 ]
[ null ]
[ 57 ]
[ 60 ]
2024-11-19T02:06:46.946954+00:00
1,497,738,898,000
140c40257640e71fa41badc57501581f55b90774
3
{ "blob_id": "140c40257640e71fa41badc57501581f55b90774", "branch_name": "refs/heads/master", "committer_date": 1497738898000, "content_id": "327cc22b7ca8dc81473cd8b513a06e990a923200", "detected_licenses": [ "MIT" ], "directory_id": "e6a624344aeaa3fc3cf41fb91ad0ebaaa98f9db5", "extension": "py", "fi...
2.625
stackv2
import re import pickle import praw from tables import Table, _trash, _header_regex, _summons_regex from utils import ioencode, get_post_text, lprint, fdate class TableSource(object): def __init__(self, praw_ref, descriptor): self.source = praw_ref self.desc = descriptor self.tables = []...
197
35.9
133
21
1,635
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_05c8fa0739e5e10d_d940e9ac", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [reddit.com](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [reddit.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 127 ]
[ null ]
[ 16 ]
[ 44 ]
2024-11-19T02:07:14.656322+00:00
1,606,000,599,000
763153f15540bde2d52c480a23fc65dd72c8225b
3
{ "blob_id": "763153f15540bde2d52c480a23fc65dd72c8225b", "branch_name": "refs/heads/main", "committer_date": 1606000599000, "content_id": "9f7109b4552a6c93f247fa201119834c99fe4059", "detected_licenses": [ "MIT" ], "directory_id": "803c3442e28bf42ff00e79f8dd517335dd085631", "extension": "py", "file...
2.796875
stackv2
from flask import Flask, render_template, request app = Flask(__name__) @app.route("/home") @app.route("/") def index(): framework= "Flask" return render_template("index.html", framework=framework) @app.route("/contact", methods=["POST"]) def contact(): name = request.form.get("name") return render_t...
30
22
61
10
173
python
[{"finding_id": "codeql_py/flask-debug_830abb36acd13f13_c98eaa9c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 30, 18, 24 ]
[ null, 20, 27 ]
[ 5, 12, 12 ]
[ 24, 8, 8 ]
2024-11-19T02:07:23.949645+00:00
1,503,156,813,000
e070de3dc5882f3164398045ceb30174123aab36
3
{ "blob_id": "e070de3dc5882f3164398045ceb30174123aab36", "branch_name": "refs/heads/master", "committer_date": 1503156875000, "content_id": "03b4d90126ae491a868fcea225958415a647dd12", "detected_licenses": [ "MIT" ], "directory_id": "9bdccad0486f29eb555dce0865effcb95346f416", "extension": "py", "fi...
2.953125
stackv2
import httplib import json import logging import time from datetime import datetime, timedelta class TimeController: def __init__(self, config): self._config = config self._current_date = None self._sunrise = None self._sunset = None fetched_location = False while ...
110
40.73
118
17
996
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_57a2c6323dbd23b2_915c6760", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 40 ]
[ null ]
[ 22 ]
[ 108 ]
2024-11-19T02:07:24.093517+00:00
1,586,627,607,000
e444b830a6c05f66f6873cd5bf1a733618d18ce2
3
{ "blob_id": "e444b830a6c05f66f6873cd5bf1a733618d18ce2", "branch_name": "refs/heads/master", "committer_date": 1586627607000, "content_id": "80cab0ffad1bb6b57c73d939526909d073886afc", "detected_licenses": [ "MIT" ], "directory_id": "08a5885f0bbb6f7f00f3a87414c05af783bd807e", "extension": "py", "fi...
2.671875
stackv2
from app import app from flask import render_template, request import requests import urllib.request from bs4 import BeautifulSoup import pandas as pd import numpy as np def getRoundPairings(round_id): ENDPOINT = "https://mtgmelee.com/Tournament/GetRoundPairings/" + \ str(round_id) r = requests.post(u...
210
39.71
110
26
2,107
python
[{"finding_id": "codeql_py/full-ssrf_6a7403d93c0bd7bd_5f63c10d", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 122 ]
[ null ]
[ 20 ]
[ 48 ]
2024-11-19T02:31:38.096747+00:00
1,516,502,295,000
446eb4dee85a4026a0387051950613d4d3dab668
2
{ "blob_id": "446eb4dee85a4026a0387051950613d4d3dab668", "branch_name": "refs/heads/master", "committer_date": 1516502295000, "content_id": "a5370a67246cada73ef4d9776af3efa7f2d5891f", "detected_licenses": [ "MIT" ], "directory_id": "fcbe5c8d2a3e1a4d96aa5f8664bf64913451ca89", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python # -*- coding: UTF-8 -*- # ============================================================================= # title : magicblueshell.py # description : Python tool to control Magic Blue bulbs over Bluetooth # author : Benjamin Piouffle # date : 23/11/2015 # usage ...
344
39.42
79
20
2,844
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_48ee74030be1bee5_d04b963f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 165 ]
[ null ]
[ 30 ]
[ 73 ]
2024-11-19T02:31:48.347278+00:00
1,505,515,880,000
2bc183157a70b1f3a407adc83a009de323ade81a
2
{ "blob_id": "2bc183157a70b1f3a407adc83a009de323ade81a", "branch_name": "refs/heads/master", "committer_date": 1505515880000, "content_id": "afe91dc8e59f7f851691aea25d735e9dafa88007", "detected_licenses": [ "MIT" ], "directory_id": "af0d0e9455b0d3ff31df35e0097afec5fa964fd0", "extension": "py", "fi...
2.5
stackv2
from flask import Flask from flask import jsonify app = Flask(__name__) @app.route("/") def hello(): return jsonify(response="Hello World!") @app.route('/_get_current_user') def get_current_user(): return jsonify(username='g.user.username', email='g.user.email', id='g.us...
19
24.16
59
10
108
python
[{"finding_id": "codeql_py/reflective-xss_d3f80f70f4cfe419_51aeb3cd", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 12 ]
[ 31 ]
2024-11-19T02:31:57.473426+00:00
1,611,930,514,000
8f6e3024615aa3573a25a2a543dd3965855c90c6
3
{ "blob_id": "8f6e3024615aa3573a25a2a543dd3965855c90c6", "branch_name": "refs/heads/main", "committer_date": 1611930514000, "content_id": "22f9e5d7f00db706ef33be5242f6b967264897f9", "detected_licenses": [ "MIT" ], "directory_id": "af0ac2076f500fc7f8d81d100559bc97b810c8d7", "extension": "py", "file...
2.671875
stackv2
import multiprocessing import time import requests # test login: vgwgsrnpxyybjnahtz@twzhhq.online CONCURRENCY = False class PassWordBreaker: def __init__( self, user_agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537....
73
30.86
141
16
527
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a2a59f50c196a0cd_bfc1160d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive d...
[ 53, 36, 51 ]
[ null, null, null ]
[ 28, 57, 42 ]
[ 61, 73, 50 ]
2024-11-19T02:32:01.728029+00:00
1,586,462,048,000
767b505f878db69dbb157797095b6dc61ddcf4b7
3
{ "blob_id": "767b505f878db69dbb157797095b6dc61ddcf4b7", "branch_name": "refs/heads/master", "committer_date": 1586462048000, "content_id": "af7fead0aaa96e7446adea5d048dfa3392f33715", "detected_licenses": [ "MIT" ], "directory_id": "8816062816e29a3291739e6800d08f8d93ef8f78", "extension": "py", "fi...
3
stackv2
''' Created on May 18, 2019 @author: Winterberger ''' import csv import json compromised_users = [] # Collect Compromised users from passwords.csv which we mysteriously obtained from The Fender with open("passwords.csv") as password_file: password_csv = csv.DictReader(password_file) for password_row in pa...
56
33.75
93
11
536
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ca975cca543bbc3f_d9631805", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 23 ]
[ null ]
[ 37 ]
[ 53 ]
2024-11-19T02:32:02.766022+00:00
1,381,813,060,000
4e8f98988d377dd2d815aa296f41d0bf51bf99eb
4
{ "blob_id": "4e8f98988d377dd2d815aa296f41d0bf51bf99eb", "branch_name": "refs/heads/master", "committer_date": 1381813060000, "content_id": "40f1a01b87703baa0304480811fdac49f5af7181", "detected_licenses": [ "Apache-2.0" ], "directory_id": "61f56656a487e097062fc0fc3a1afc428ca7b954", "extension": "py"...
3.53125
stackv2
#!/usr/bin/python # Copyright 2010 Google Inc. # Licensed under the Apache License, Version 2.0 # http://www.apache.org/licenses/LICENSE-2.0 # Google's Python Class # http://code.google.com/edu/languages/google-python-class/ import sys import re import glob """Baby Names exercise Define the extract_names() function...
150
28.37
102
17
1,257
python
[{"finding_id": "codeql_py/redos_4499335fa0e52dd9_6686378d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<tr align=\"a\"><td>9</td><td>' a...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<tr align=\"a\"><td>9</td><td>' and containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings starting with '<tr align=\"a\"><td>9</td><td>a</td><td>' an...
[ 88, 88 ]
[ null, null ]
[ 62, 77 ]
[ 65, 80 ]
2024-11-19T02:32:13.445479+00:00
1,526,589,505,000
f789144a026850e4b31987a4776e13db8442d36d
2
{ "blob_id": "f789144a026850e4b31987a4776e13db8442d36d", "branch_name": "refs/heads/master", "committer_date": 1526589505000, "content_id": "30caee17cd28e213ae2acf484c9464a914157d84", "detected_licenses": [ "BSD-3-Clause", "BSD-2-Clause" ], "directory_id": "41504e165a28df18b6c8e0abc15ddba7a9c54561...
2.3125
stackv2
import datetime import json import os from django.contrib.auth.models import User import requests from rest_framework.authentication import TokenAuthentication, get_authorization_header from rest_framework import exceptions from rest_framework.authtoken.models import Token from nbrepo import settings class GenePatt...
127
37.87
109
17
887
python
[{"finding_id": "codeql_py/stack-trace-exposure_d33fef6901a33ad8_297b5530", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 124 ]
[ null ]
[ 51 ]
[ 52 ]
2024-11-19T02:32:21.141658+00:00
1,554,344,765,000
44080f236ad60d6d98ec17c7c2b801b34bd6d355
3
{ "blob_id": "44080f236ad60d6d98ec17c7c2b801b34bd6d355", "branch_name": "refs/heads/master", "committer_date": 1554344765000, "content_id": "31fa05325d6657837928b5e520a59e90af9fe49a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d9cd69824fb3760ef3f2ce7b14f113a8891edf05", "extension": "py"...
2.5625
stackv2
# coding: utf-8 '''Email templating and dispatch.''' from smtplib import SMTP from email.mime import multipart, text from jinja2 import Environment, FileSystemLoader from .config import config from .log import logger # Create a logger. log = logger(__name__) # pylint: disable=invalid-name # Create the Jinja environm...
49
29.57
66
13
369
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_66c43f7fbe1ebfa6_42f49130", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 14 ]
[ 16 ]
[ 17 ]
[ 2 ]
2024-11-19T02:32:49.792712+00:00
1,623,250,408,000
526b26975300171ccb9bb3307f8167d3cd932343
3
{ "blob_id": "526b26975300171ccb9bb3307f8167d3cd932343", "branch_name": "refs/heads/master", "committer_date": 1623250408000, "content_id": "08a0c75ad98447235d6ac7d072208eeb8f6c930b", "detected_licenses": [ "MIT" ], "directory_id": "36a5ce70b1ba4e217a650602c0b71a60fb8c55c5", "extension": "py", "fi...
3.09375
stackv2
class Employee: default_db_file = "employee_file.txt" @classmethod def get_all(cls, file_name=None): results = [] if not file_name: file_name = cls.default_db_file with open(file_name, "r") as f: lines = [ line.strip("\n").split(",") + [inde...
66
29.18
87
20
429
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5aa6401aef47249e_7e02c4b5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 58 ]
[ null ]
[ 26 ]
[ 31 ]
2024-11-19T02:32:50.022103+00:00
1,596,908,550,000
a869ec138c6e1cd64c378d14c39b1ec4cbb51cb0
3
{ "blob_id": "a869ec138c6e1cd64c378d14c39b1ec4cbb51cb0", "branch_name": "refs/heads/master", "committer_date": 1596908550000, "content_id": "d21424bc5fb8ef470e5199f57e47c7c446ce1fa3", "detected_licenses": [ "MIT" ], "directory_id": "17c2a23007c39dbf93d0eb7ca5d5193f0f7069e3", "extension": "py", "fi...
3.265625
stackv2
#!/usr/bin/python ''' FileName: PasswordValidator.py Author: John Delgado Created Date: 8/5/2020 Version: 1.0 Initial Development This program will be checking a list of passwords from a file and validating each line in that file that it meets the all the requirements below. If any of the requirements are not met the...
105
47.28
166
15
894
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a462e46583b71d90_68f1c0cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 97 ]
[ null ]
[ 15 ]
[ 121 ]
2024-11-19T02:32:56.623620+00:00
1,684,531,919,000
31dcf234b7379d2fc70c95ff24b094e6ddb96c9d
2
{ "blob_id": "31dcf234b7379d2fc70c95ff24b094e6ddb96c9d", "branch_name": "refs/heads/master", "committer_date": 1684829346000, "content_id": "80e0542e6e8794fc69784df9940671e3a5acc55f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6df06b8581a29e93f8d375211ec6ac2626839592", "extension": "py"...
2.359375
stackv2
# Copyright 2013: Mirantis Inc. # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required b...
307
34.79
79
19
2,341
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bb4114466a89479a_2f05f622", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 123 ]
[ null ]
[ 13 ]
[ 79 ]
2024-11-19T02:43:33.336118+00:00
1,621,584,733,000
e1c3c6b4a2337ea92b44be079e85167cd61fba81
3
{ "blob_id": "e1c3c6b4a2337ea92b44be079e85167cd61fba81", "branch_name": "refs/heads/master", "committer_date": 1621584733000, "content_id": "0ea1c999054d297289ea84334e37e354dd4a2953", "detected_licenses": [ "MIT" ], "directory_id": "f4a554440e3c382375ad8eeabcee6aaadb3113ba", "extension": "py", "fi...
3
stackv2
import json import hashlib import change_password import user_register with open('userinfo_files/userinfo.json') as f: user_data = json.load(f) def valid_user(username): for key in user_data.keys(): if username == key: return True def valid_password(password): hash_password = hash...
56
26.27
96
13
320
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_eefd8526c969b6e6_dbb955d2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 19 ]
[ null ]
[ 36 ]
[ 53 ]
2024-11-19T02:43:40.051707+00:00
1,557,999,727,000
fbdec075a38e1a3e42a75006aafc40bd7d0d65f5
2
{ "blob_id": "fbdec075a38e1a3e42a75006aafc40bd7d0d65f5", "branch_name": "refs/heads/master", "committer_date": 1557999727000, "content_id": "77065b0b433f253513470720da414a989da10478", "detected_licenses": [ "MIT" ], "directory_id": "2d5983f97f55be79880f17c56df2eb9353038d10", "extension": "py", "fi...
2.359375
stackv2
"""Main application access point""" import json import logging import os import time import werkzeug import werkzeug.exceptions from flask import Flask, render_template, request, send_from_directory, Markup # import kolme_muusaa.settings as s __WEB_APP_PATH__ = os.path.dirname(os.path.realpath(__file__)) # __WEB_AP...
238
38.21
115
31
1,802
python
[{"finding_id": "codeql_py/log-injection_fc04a06e220b2f0a_b2ff92ac", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
6
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depen...
[ 103, 118, 128, 131, 135, 138 ]
[ null, null, null, null, null, null ]
[ 22, 42, 38, 38, 35, 30 ]
[ 60, 70, 50, 50, 95, 69 ]
2024-11-19T02:55:09.153971+00:00
1,513,766,205,000
2300a937f58f37b17e4dc0f0fad3e9c1cdb09fe3
3
{ "blob_id": "2300a937f58f37b17e4dc0f0fad3e9c1cdb09fe3", "branch_name": "refs/heads/master", "committer_date": 1513766205000, "content_id": "77954512672482e319ba7ad3ae0ef18e379f2665", "detected_licenses": [ "MIT" ], "directory_id": "0b124e847a5f37a75798e5cac95319833f1373e1", "extension": "py", "fi...
2.609375
stackv2
# -*- coding: utf-8 -*- import requests from bs4 import BeautifulSoup import time import thread def download_imag(number): global img_flag,succes_flag print('save numner: ' + str(number) + ' img, img_flag = ' + str(img_flag)) requests.packages.urllib3.disable_warnings() URL = "https://www.db.yugioh-c...
67
29.79
156
14
583
python
[{"finding_id": "codeql_py/request-without-cert-validation_9a9e66f416f0d260_2ae16d8f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 14 ]
[ null ]
[ 11 ]
[ 61 ]
2024-11-19T02:55:51.820968+00:00
1,557,416,174,000
c3d1d3dbd5120c7f39d7e3d987c6d9d12d082c11
3
{ "blob_id": "c3d1d3dbd5120c7f39d7e3d987c6d9d12d082c11", "branch_name": "refs/heads/master", "committer_date": 1557416174000, "content_id": "f476aff17f9d22a92fb3193777cea45183834317", "detected_licenses": [ "MIT" ], "directory_id": "36ceedd21d979a50a07e3f597817d5f87f1c38fe", "extension": "py", "fi...
2.796875
stackv2
#!/usr/bin/env python3 import requests import urllib import json import time import os from huffman_code import Node, Huffman TOKEN = os.environ['SECRET_TOKEN'] URL = "https://api.telegram.org/bot{}/".format(TOKEN) HELP = """ /help /encode <text> """ def make_request(url): response = requests.get(url) retur...
139
29.12
121
23
973
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_062408304d39f5de_ccd2d4e0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 82, 87, 87, 87 ]
[ null, null, null, null ]
[ 19, 15, 24, 29 ]
[ 53, 22, 27, 33 ]
2024-11-19T02:56:06.020286+00:00
1,507,066,426,000
a86f3bb226e50f85abcdab8bf82ce1e5b3141750
3
{ "blob_id": "a86f3bb226e50f85abcdab8bf82ce1e5b3141750", "branch_name": "refs/heads/master", "committer_date": 1507066426000, "content_id": "b37fe81f94985f3639c01a016506c8a772b79679", "detected_licenses": [ "MIT" ], "directory_id": "842748f8cbd95ed6f73e44847dca2a45b1fc16de", "extension": "py", "fi...
2.59375
stackv2
import websocket import json import requests import urllib import os import logging # Suppress InsecureRequestWarning from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) ###VARIABLES THAT YOU NEED TO SET MANUALLY IF NOT ON HEROKU##...
88
31.73
120
22
680
python
[{"finding_id": "codeql_py/request-without-cert-validation_0d505d532b3deb7d_2dcb4f8e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 49 ]
[ 50 ]
[ 9 ]
[ 72 ]
2024-11-19T03:10:23.179961+00:00
1,505,695,309,000
1dc3da6bb1f59228753d91a365ebefc43fa3f5dc
3
{ "blob_id": "1dc3da6bb1f59228753d91a365ebefc43fa3f5dc", "branch_name": "refs/heads/master", "committer_date": 1505695309000, "content_id": "8fe172663a6f380d951323146f173c46589f91ff", "detected_licenses": [ "MIT" ], "directory_id": "d4c8e8e39d2634ea406362893985d42a31758df0", "extension": "py", "fi...
2.75
stackv2
# coding: utf8 import json import os import time import random import socket import hashlib try: lib = __import__('pandas') globals()['pd'] = lib except ImportError: pandas_import_error_msg = \ ''' Este script utiliza la libreria de Python Pandas. Por favor ejecuta: $ sudo -H pip install pand...
258
29.09
104
19
1,880
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_58197a46e6a631a9_86cc827d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 181 ]
[ null ]
[ 24 ]
[ 28 ]
2024-11-19T03:21:49.927168+00:00
1,629,008,195,000
f9bf4de1b1803210fd51ab452c1854e92165d0ea
2
{ "blob_id": "f9bf4de1b1803210fd51ab452c1854e92165d0ea", "branch_name": "refs/heads/master", "committer_date": 1629008195000, "content_id": "fa49ab34f7f73cf954128d68dc72855ccfd225a3", "detected_licenses": [ "MIT" ], "directory_id": "60486f841ed4d1f30dfd196966a825f182138a67", "extension": "py", "fi...
2.3125
stackv2
from django.shortcuts import render, redirect, reverse from django.http import HttpResponse from django.contrib import messages from django.views import View from django.contrib.auth.models import User from django.contrib.auth import authenticate, login, logout from django.db import connection from django.core.mail imp...
95
32.93
95
19
743
python
[{"finding_id": "codeql_py/sql-injection_0a3b92c09142a6ad_3a8a58c1", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
3
true
[ "CWE-089", "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 32, 73, 93 ]
[ null, null, null ]
[ 20, 19, 18 ]
[ 23, 22, 21 ]
2024-11-19T03:22:20.283140+00:00
1,614,224,878,000
5d5a7e7de70d648f556317d91b208a90b5bc4579
3
{ "blob_id": "5d5a7e7de70d648f556317d91b208a90b5bc4579", "branch_name": "refs/heads/main", "committer_date": 1614224878000, "content_id": "a4e0359a6aaa410c53502ef046988dd9601a230d", "detected_licenses": [ "MIT" ], "directory_id": "1c66f40f7d12b94ddb8f71ea2dfef661c7d198ec", "extension": "py", "file...
2.6875
stackv2
def createAccounts(detailsNewUser): # This module will take the information that the user provided and build a # PowerShell script to create the new account in example.com. The # PowerShell script will be saved in and run from the user's home directory. import subprocess, os from pathlib import Pat...
105
49.3
174
15
1,449
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_67e6703d8ae8fe4e_4b7021aa", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitiv...
[ 80, 81 ]
[ null, null ]
[ 19, 19 ]
[ 38, 39 ]
2024-11-19T03:43:59.170293+00:00
1,662,976,500,000
edbafdb77ba70ab5c1cada54621079db382228f2
3
{ "blob_id": "edbafdb77ba70ab5c1cada54621079db382228f2", "branch_name": "refs/heads/master", "committer_date": 1662976500000, "content_id": "8ffd8dcbbf27a46a62760b475d856ddf4f020ddc", "detected_licenses": [ "MIT" ], "directory_id": "f7db2ff3ca2d4885ecf9a856e28e67bc1a4b7764", "extension": "py", "fi...
2.859375
stackv2
""" Partly adapted from https://github.com/ebmdatalab/html-template-demo """ from datetime import date import markupsafe import jinja2 from lxml import html definitions = { "Chemical Items": "number of prescribed items containing this chemical", "Subparagraph Items": "count of all prescribed items " "from...
372
26.41
79
18
2,370
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0d3e811a2e2a5b9a_30f14a4e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 359 ]
[ null ]
[ 20 ]
[ 45 ]
2024-11-19T03:44:11.478850+00:00
1,578,756,581,000
d091edb736ddac959e41a6c940173b7175accea5
3
{ "blob_id": "d091edb736ddac959e41a6c940173b7175accea5", "branch_name": "refs/heads/master", "committer_date": 1578756581000, "content_id": "9a6491092f868cee23e3dc129103b0a90731c1b0", "detected_licenses": [ "MIT" ], "directory_id": "deb152a6c7354c1219f3e2a79124113fb5e7e14f", "extension": "py", "fi...
2.6875
stackv2
from flask import Flask, request import requests import os import io app = Flask(__name__) token = '' # <-- Telegram bot token URL = 'https://api.telegram.org/{}/'.format(token) os.environ['GOOGLE_APPLICATION_CREDENTIALS'] = '' # <-- Path to google private key json file def get_bot_info(): getBotInfoRequest = r...
108
31.2
114
13
784
python
[{"finding_id": "codeql_py/flask-debug_f340dac09c5df406_7aadcac3", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of th...
[ 107, 38, 51, 31, 35 ]
[ null, null, null, null, null ]
[ 5, 15, 18, 17, 16 ]
[ 24, 24, 27, 102, 115 ]
2024-11-19T03:44:25.088467+00:00
1,606,219,351,000
6c0ec1db621bf275b8c7b80e6a00ec8eac40fabf
3
{ "blob_id": "6c0ec1db621bf275b8c7b80e6a00ec8eac40fabf", "branch_name": "refs/heads/master", "committer_date": 1606219351000, "content_id": "5f881c36db30c3fb4e5ca39c4e76657213c8b849", "detected_licenses": [ "MIT" ], "directory_id": "cabf40224181947a4462271ee3a629a61c806c48", "extension": "py", "fi...
2.6875
stackv2
from flask import Flask, render_template, request, Response from werkzeug.utils import secure_filename import yake from highlight import TextHighlighter from wordcloud import WordCloud, STOPWORDS, ImageColorGenerator import nltk nltk.download('stopwords') from nltk.corpus import stopwords import random import os impor...
69
30.87
117
15
486
python
[{"finding_id": "codeql_py/flask-debug_3c15f9de162973ba_9793f346", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 69, 29 ]
[ null, null ]
[ 5, 19 ]
[ 24, 46 ]