added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T19:28:47.998678+00:00
1,632,656,060,000
9194de1deb2f2e84522e797413edc3a0c7eaf9a8
2
{ "blob_id": "9194de1deb2f2e84522e797413edc3a0c7eaf9a8", "branch_name": "refs/heads/master", "committer_date": 1632656060000, "content_id": "67ec47543165a2ee5a720a06f44de76260e4fb32", "detected_licenses": [ "MIT" ], "directory_id": "88ec732d185d1323833ba1a5113edde32a86e28f", "extension": "py", "fi...
2.390625
stackv2
# importing stuff from flask import * import matplotlib from matplotlib import * from config import * matplotlib.use("agg") import numpy as np import matplotlib.pyplot as plt import os import traceback # Adding a blueprint to start the graph function beta_flat_graph_runner = Blueprint("beta_flat_graph_runner", __name...
429
34.39
172
18
3,219
python
[{"finding_id": "codeql_py/stack-trace-exposure_9399841198c0dbf7_c2e420c1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
20
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure",...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 101, 137, 158, 176, 194, 209, 225, 262, 281, 298, 314, 330, 336, 352, 367, 382, 403, 417, 419, 153 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 23, 23, 23, 23, 23, 23, 23, 23, 27, 27, 27, 27, 23, 23, 23, 23, 23, 34, 30, 28 ]
[ 29, 29, 29, 29, 29, 29, 29, 29, 33, 33, 33, 33, 29, 29, 29, 29, 29, 40, 36, 66 ]
2024-11-18T19:28:54.186003+00:00
1,587,578,191,000
60b27b1e7bf2d78aa7e5ee6a41bd27949d4058ef
3
{ "blob_id": "60b27b1e7bf2d78aa7e5ee6a41bd27949d4058ef", "branch_name": "refs/heads/master", "committer_date": 1587578191000, "content_id": "b7460072476f425bd16d4eeb5d0e8247d4f989ac", "detected_licenses": [ "MIT" ], "directory_id": "914d02bff6baea3eebff24d7bdda01391c5a37e7", "extension": "py", "fi...
2.953125
stackv2
"""Pre-made Dataset Provider. """ import pandas as pd import tarfile import os from os.path import dirname, abspath __all__ = ['init', 'reset', 'ls', 'load'] def init(): """ Summary `unipy` package has some famous datasets. This function unzip the embedded dataset to...
161
25.12
82
20
1,099
python
[{"finding_id": "codeql_py/tarslip_99267a7285730576_57cb64b5", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 42, 68 ]
[ null, null ]
[ 5, 5 ]
[ 8, 8 ]
2024-11-18T19:39:54.160423+00:00
1,478,031,871,000
95d97db8a63ec3bbcd6d8b14b4d07fcdbbe37782
3
{ "blob_id": "95d97db8a63ec3bbcd6d8b14b4d07fcdbbe37782", "branch_name": "refs/heads/master", "committer_date": 1478031871000, "content_id": "80b512af526711b136be9f12d8712af5e155bbc5", "detected_licenses": [ "MIT" ], "directory_id": "76f4a12df4e0c09f36bccfcbf4bb694b1e41462b", "extension": "py", "fi...
2.5625
stackv2
__author__ = "Maxim Averin" # -- coding: utf-8 -- import codecs import datetime import requests import json import re import sys from datetime import timedelta from time import strftime from bs4 import BeautifulSoup import config # constants BASE_URL = "https://www.googleapis.com/youtube/v3/search?part=snippet" BASE...
124
25.85
90
19
809
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_933865028ee60b27_25f671a8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 91 ]
[ null ]
[ 19 ]
[ 29 ]
2024-11-18T19:39:57.959640+00:00
1,353,390,388,000
c29e948533081b3e8e1ebb688b624d3f2cc29b66
2
{ "blob_id": "c29e948533081b3e8e1ebb688b624d3f2cc29b66", "branch_name": "refs/heads/master", "committer_date": 1353390388000, "content_id": "a9076a8e7eb16d129bcd71f854c0cd2285c18a02", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "e949fd8c208ca0d33aee149003bd729b02c0f5ed", "extension": "p...
2.4375
stackv2
# -*- coding: utf-8 -*- from __future__ import unicode_literals import json import collections import sqlsoup from sqlalchemy.exc import IntegrityError from bottle import (response, request, route, run) DBURL = 'postgresql+psycopg2://testuser:testpass@localhost/test' DB = sqlsoup.SQLSoup(DBURL) DEFAULT_LIMIT=1000 DE...
124
28.19
71
17
863
python
[{"finding_id": "codeql_py/stack-trace-exposure_676abc325c78a5df_258b2254", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 73, 102 ]
[ null, null ]
[ 16, 24 ]
[ 54, 54 ]
2024-11-18T20:18:05.788310+00:00
1,552,507,532,000
93ebb69a5b52e729e15f20befee4c00ebabe41db
2
{ "blob_id": "93ebb69a5b52e729e15f20befee4c00ebabe41db", "branch_name": "refs/heads/master", "committer_date": 1552507532000, "content_id": "23c41a977c4fa2de1f6f395d2ba4b5abf166c339", "detected_licenses": [ "MIT" ], "directory_id": "2457894c4e7a6d367500b5c27c5cd7b4fc8ecdb3", "extension": "py", "fi...
2.359375
stackv2
import logging import requests from flask import render_template, request from app.views.utils import URL logger = logging.getLogger(__name__) def new_message(): if request.method == 'POST': return _new_message_post(request) else: return render_template( "new_message.html", ...
71
25.07
97
12
422
python
[{"finding_id": "codeql_py/request-without-cert-validation_53bf6321a96df5ac_2f261cc8", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 31, 47 ]
[ null, null ]
[ 16, 16 ]
[ 98, 83 ]
2024-11-18T20:18:57.041364+00:00
1,630,595,592,000
3e7d72fce07eca65bd39aa60793d551c1b2bda81
3
{ "blob_id": "3e7d72fce07eca65bd39aa60793d551c1b2bda81", "branch_name": "refs/heads/main", "committer_date": 1630595592000, "content_id": "15c167ed8f2526ebbef2bbb86ed34d572b41ed0d", "detected_licenses": [ "MIT" ], "directory_id": "7791bc4edf6b546e1aac6b5b417ba0a0fff67513", "extension": "py", "file...
2.796875
stackv2
"""Reads from keys.json that can be generated with quick_start.py""" import json import traceback try: f=open('settings/keys.json') keys=json.load(f) f.close() except: traceback.print_exc() keys={'public':'', 'secret':''} def key(): """Returns public api key for binance Returns: ...
32
16.44
68
10
131
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d429fe082cad77c0_7f5598f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 32 ]
[ null ]
[ 11 ]
[ 22 ]
2024-11-18T20:29:36.906972+00:00
1,693,555,511,000
6865386a5c6b3052fd8d49085d6b251a97015431
2
{ "blob_id": "6865386a5c6b3052fd8d49085d6b251a97015431", "branch_name": "refs/heads/master", "committer_date": 1693555511000, "content_id": "120a23f733e516ca00b5d8902f06130200d88e61", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "2feaddc19de5490a1b55af08079d7e1d866f4c2d", "extension": "p...
2.421875
stackv2
import os import shutil import tarfile from pathlib import Path from pkg_resources import resource_filename from walt.common.tools import failsafe_makedirs, failsafe_symlink TFTP_ROOT = "/var/lib/walt/" PXE_PATH = TFTP_ROOT + "pxe/" NODES_PATH = TFTP_ROOT + "nodes/" TFTP_STANDBY_DIR = Path(TFTP_ROOT + "tftp-standby")...
147
39.19
87
14
1,486
python
[{"finding_id": "codeql_py/tarslip_a18154a196eb1d3f_11e6db55", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 23 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T20:29:38.386041+00:00
1,659,650,880,000
b41abce1928253f8f3a1c2634f4b9425fc556942
2
{ "blob_id": "b41abce1928253f8f3a1c2634f4b9425fc556942", "branch_name": "refs/heads/master", "committer_date": 1659650880000, "content_id": "bed53c44722ef282c3200f650ef0e7406243759e", "detected_licenses": [ "Apache-2.0", "MIT", "BSD-3-Clause" ], "directory_id": "0c44da76a30138ebaee6700e2e33df5...
2.46875
stackv2
""" * @section LICENSE * * @copyright * Copyright (c) 2019 Intel Corporation * * @copyright * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * @copyright * http://www.apache.org...
177
37.31
151
18
1,391
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_de136c55e368bc6d_b02a6bd6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-022" ]
[ "py/clear-text-storage-sensitive-data", "py/tarslip" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 162, 96 ]
[ null, null ]
[ 26, 9 ]
[ 43, 48 ]
2024-11-18T20:29:50.402069+00:00
1,592,133,270,000
2078085e2eaa260ba0c13fd0a613556247934136
3
{ "blob_id": "2078085e2eaa260ba0c13fd0a613556247934136", "branch_name": "refs/heads/master", "committer_date": 1592133270000, "content_id": "9552b33ddaace961bb54b3f00a1a9089efa7713f", "detected_licenses": [ "MIT" ], "directory_id": "e59b12f314b32e0e69d0dfce6dd0eb53f2f784f1", "extension": "py", "fi...
2.5625
stackv2
from flask import Flask from flask import request import requests app = Flask(__name__) @app.route('/register/<node>', methods=['POST']) def register(node): print("name : ", node , '\tip:', request.remote_addr ) return 'REGISTER SUCCESS' @app.route('/<node>/alive', methods=['POST']) def alive(node): print...
38
27.68
91
16
268
python
[{"finding_id": "codeql_py/full-ssrf_c3ea04f26ba45e14_b0d4d414", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 24 ]
[ null ]
[ 13 ]
[ 91 ]
2024-11-18T19:07:07.652425+00:00
1,540,892,492,000
52d3b360a2dcdd7a810e0d7dc295ef6b3447363b
2
{ "blob_id": "52d3b360a2dcdd7a810e0d7dc295ef6b3447363b", "branch_name": "refs/heads/master", "committer_date": 1540892749000, "content_id": "d35c7bff3c976c6bc92ae65277cbee209593ca28", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d8176ecf9769ef5a56057abfc5b75c4657c6e206", "extension": "py"...
2.421875
stackv2
import utils.logs as logs try: import requests requests.packages.urllib3.disable_warnings() except: print "[-]Failed to import requests module" def api_request(url, method, headers, body=None): try: if method.upper() == "GET": auth_request = requests.get(url, headers=headers, ...
27
36.56
79
14
193
python
[{"finding_id": "codeql_py/request-without-cert-validation_49a78cb15237633b_b0a1e690", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 14, 17, 20, 23 ]
[ 15, 18, 21, null ]
[ 28, 28, 28, 28 ]
[ 77, 78, 77, 80 ]
2024-11-18T19:07:19.871067+00:00
1,548,331,697,000
22759f12919b2daf9b2b652dc394ced1e973e9fe
3
{ "blob_id": "22759f12919b2daf9b2b652dc394ced1e973e9fe", "branch_name": "refs/heads/master", "committer_date": 1548331697000, "content_id": "33f954e373ba485cc7b406861194527e100709eb", "detected_licenses": [ "MIT" ], "directory_id": "64c223ec184cff9d5c74061a6e5e95cc624ef0b5", "extension": "py", "fi...
2.65625
stackv2
import base64 import requests import data_manager as ds def get_auth_header(token): # Creating the authorization header auth = f'riot:{token}'.encode() b64encoded = base64.b64encode(auth).decode() authorization_header = f'Basic {b64encoded}' return authorization_header def __request(relative_...
39
23.92
79
12
233
python
[{"finding_id": "codeql_py/request-without-cert-validation_d9e38db2d3876473_cef8fc57", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 27, 29 ]
[ null, null ]
[ 20, 20 ]
[ 68, 80 ]
2024-11-18T19:07:55.961105+00:00
1,571,769,061,000
9441a21e69aecf16f43a33a708fe55f04f0d0f4b
3
{ "blob_id": "9441a21e69aecf16f43a33a708fe55f04f0d0f4b", "branch_name": "refs/heads/master", "committer_date": 1571769061000, "content_id": "a47e053190681a60921376b619031c3697962f4d", "detected_licenses": [ "MIT" ], "directory_id": "0546958d1b9b5e62abc76efe9137bafc6a6cb1e8", "extension": "py", "fi...
3
stackv2
from user import Login, AddUser # from run import Login, def create_login(fname,lname,phone,email,password): ''' Function to create a new login# ''' new_login = Login(fname,lname,phone,email,password) return new_login def save_login(login): ''' Function to save login ''' login.save_l...
114
32.91
158
19
787
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_98907354c5b821bd_d9cb41b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 78, 91, 102 ]
[ null, null, null ]
[ 27, 23, 23 ]
[ 96, 71, 68 ]
2024-11-18T19:08:01.517365+00:00
1,387,893,877,000
391e9421b1826e27f6501e498ebc957d69f79b4a
3
{ "blob_id": "391e9421b1826e27f6501e498ebc957d69f79b4a", "branch_name": "refs/heads/master", "committer_date": 1387893877000, "content_id": "42b89e5fdfaf06aa7894423395f6e308873f26b8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a00aa062e34fe155b576028fd1774c10f76fb4e4", "extension": "py"...
2.609375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from abc import ABCMeta, abstractmethod import hmac import hashlib import base64 import collections import six from six.moves.urllib import parse import requests class AttributeInvokeMixin(object): def __getattr__(self, name): def handle(*args, **kwargs): ...
190
28.28
75
16
1,134
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c2c76740ac176a4b_9fd441b3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 113, 157 ]
[ null, null ]
[ 18, 13 ]
[ 28, 34 ]
2024-11-18T19:08:03.006959+00:00
1,637,015,209,000
c59e7d50ad14d13eb6ee272b7c82e781e37dcfcf
2
{ "blob_id": "c59e7d50ad14d13eb6ee272b7c82e781e37dcfcf", "branch_name": "refs/heads/main", "committer_date": 1637015209000, "content_id": "0174ceefad3cd1f3fbb9bdd1bbeab37da47cdeff", "detected_licenses": [ "MIT" ], "directory_id": "65a603dbbca020e5e1f7c0d594543b8dddc98de6", "extension": "py", "file...
2.421875
stackv2
from flask import render_template, url_for, flash, redirect, request from flaskblog import app, db, bcrypt from flaskblog.forms import RegistrationForm, LoginForm from flaskblog.models import User from flask_login import login_user, current_user, logout_user, login_required import csv from newsapi import NewsApiClient ...
169
32.1
97
16
1,233
python
[{"finding_id": "codeql_py/url-redirection_b7a0d2644eba1e6a_9712fc72", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 34 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-18T19:18:11.639049+00:00
1,636,391,227,000
a478d66609f1037fccb5c5390d9b0c261ddd167a
2
{ "blob_id": "a478d66609f1037fccb5c5390d9b0c261ddd167a", "branch_name": "refs/heads/main", "committer_date": 1636391227000, "content_id": "a0ba791c81507f830a9b63a3160f33a4f1dd72a6", "detected_licenses": [ "MIT" ], "directory_id": "f9e17a2fc63e7a9af107984aa60f4df943828949", "extension": "py", "file...
2.484375
stackv2
#!/usr/bin/env python3 ###################################################################### ## Author: Carl Schaefer, Smithsonian Institution Archives ###################################################################### import sys import time import os import re import hashlib import xml_common COMMON_PATH_SEP =...
177
26.51
84
16
1,410
python
[{"finding_id": "codeql_py/overly-large-range_b2a3fef43467a493_6f4d9bf9", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u0015\\...." ]
[ 47 ]
[ null ]
[ 49 ]
[ 52 ]
2024-11-18T19:18:12.742679+00:00
1,603,312,826,000
24138b090e23b69f75180c9c7acd00d80d110914
2
{ "blob_id": "24138b090e23b69f75180c9c7acd00d80d110914", "branch_name": "refs/heads/main", "committer_date": 1603312826000, "content_id": "5d57ca3c64605edde1e7265704e7bcb78d740f7b", "detected_licenses": [ "MIT", "BSD-3-Clause", "Apache-2.0" ], "directory_id": "426e8cf277306486b47939f66b7329c13...
2.46875
stackv2
from flask import request, Response from flask_restful import Resource import json import traceback from ..servicos.carga_processos import carregar_dados_processos, carregar_dados_processo class CarregarProcessos(Resource): def post(self): try: body = json.loads(request.get_data().decode('UTF...
45
36.29
132
16
381
python
[{"finding_id": "codeql_py/reflective-xss_42f1fd2d430b1b16_494fe9e6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 18, 35 ]
[ null, null ]
[ 29, 29 ]
[ 48, 48 ]
2024-11-18T19:18:30.303558+00:00
1,620,382,196,000
e3ca051a8af74cf595fca08dbca60f586d2110b1
2
{ "blob_id": "e3ca051a8af74cf595fca08dbca60f586d2110b1", "branch_name": "refs/heads/master", "committer_date": 1620382196000, "content_id": "d674657c098aaa8f904d4e8d38d5ef6ee38eaaa3", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "67807a6fb1fe74223e2901feafde9d749822430e", "extension": "p...
2.3125
stackv2
"""OpenAPI core contrib django requests module""" import re from six.moves.urllib.parse import urljoin from openapi_core.contrib.django.compat import ( get_headers, get_current_scheme_host, ) from openapi_core.validation.request.datatypes import ( RequestParameters, OpenAPIRequest, ) # https://docs.djangopro...
57
32.47
77
16
416
python
[{"finding_id": "codeql_py/redos_51e486a500a4910b_c2da62a7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetitions of ':'." ]
[ 23 ]
[ null ]
[ 46 ]
[ 49 ]
2024-11-18T19:18:44.312959+00:00
1,686,792,379,000
ac6c5ba8c689e44882084e6f79631d14f0190a05
3
{ "blob_id": "ac6c5ba8c689e44882084e6f79631d14f0190a05", "branch_name": "refs/heads/main", "committer_date": 1686792379000, "content_id": "b01dc4cf31c0db23dddf63fbc0b21da1250d4106", "detected_licenses": [ "Apache-2.0" ], "directory_id": "aa5a8163c450a7ca7f4d3e7483213bb3642e0824", "extension": "py", ...
3.03125
stackv2
import json import random from flask import Flask, request from pymessenger.bot import Bot with open('keys.json', 'r') as file: ACCESS_TOKEN = json.loads(file.read())['facebook']['token'] VERIFY_TOKEN = 'tensy' app = Flask(__name__) bot = Bot(ACCESS_TOKEN) # Получать сообщения, посылаемые фейсбуком нашему боту ...
62
39.32
122
19
593
python
[{"finding_id": "codeql_py/reflective-xss_0e15241db8ed0ea3_16ce103a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 16 ]
[ 43 ]
2024-11-18T19:19:10.454544+00:00
1,513,529,801,000
309d1ca589f603349e506bdfee6f6d3650031c9f
2
{ "blob_id": "309d1ca589f603349e506bdfee6f6d3650031c9f", "branch_name": "refs/heads/master", "committer_date": 1513529801000, "content_id": "14f5a3c7c8e7ee00040b09f67182fa49911bdbd1", "detected_licenses": [ "MIT" ], "directory_id": "9a73f1f9790ff2dd8a42c362e72392dabeaf0267", "extension": "py", "fi...
2.4375
stackv2
from __future__ import print_function import argparse import csv import hashlib import json import os import requests import sys import time """ MIT License Copyright (c) 2017 Chapin Bryce, Preston Miller Please share comments and questions at: https://github.com/PythonForensics/PythonForensicsCookbook or em...
198
33.66
78
17
1,528
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1aed89885a3daff6_ac050b5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 59, 92 ]
[ 60, 93 ]
[ 15, 15 ]
[ 17, 17 ]
2024-11-18T19:19:15.892316+00:00
1,634,720,730,000
a4d8b7b5c6046f15cbc61f77367e4ffb7c770ab4
3
{ "blob_id": "a4d8b7b5c6046f15cbc61f77367e4ffb7c770ab4", "branch_name": "refs/heads/master", "committer_date": 1634720730000, "content_id": "f5e28c14bc6d82fde03ec23d6d6e293ecb086ab1", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f21e52e4900888dcf1d99d2187dc5d1f7e5ff4f2", "extension": "p...
2.875
stackv2
""" Methods for code generation (using jinja2 templates). """ import os import posixpath import time import jinja2 import sympy from cellmlmanip.model import Quantity from cellmlmanip.parser import SYMPY_SYMBOL_DELIMITER, Transpiler from cellmlmanip.printer import Printer # Tell cellmlmanip to create _exp objects ins...
406
36.64
119
20
3,457
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9dafc700e74443a8_d9364e73", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30 ]
[ 41 ]
[ 24 ]
[ 10 ]
2024-11-18T19:29:46.242729+00:00
1,607,594,828,000
db13dfc1d4bca8451d4be3ec424dea52ee2c1d44
2
{ "blob_id": "db13dfc1d4bca8451d4be3ec424dea52ee2c1d44", "branch_name": "refs/heads/master", "committer_date": 1607701910000, "content_id": "111ad59c92e863d9f8b5215806174086aed35a19", "detected_licenses": [ "MIT" ], "directory_id": "1f0f7359e2ef181d8c8b5f0f39ce9dc489eff2cb", "extension": "py", "fi...
2.453125
stackv2
import logging import fileinput import glob import re import os import ast import json import subprocess import urllib.request import requests import yaml from jinja2 import Environment, FileSystemLoader logging.basicConfig(level=logging.INFO) JinjaEnv = Environment( loader=FileSystemLoader(f"{os.path.join(os.p...
303
32.67
86
21
2,276
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_85a255a045ce2c41_85382d47", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ 21 ]
[ 12 ]
[ 2 ]
2024-11-18T19:29:48.422122+00:00
1,522,313,801,000
5d50aff47cc47ebe178e9f67c5610843cbdd1ec6
3
{ "blob_id": "5d50aff47cc47ebe178e9f67c5610843cbdd1ec6", "branch_name": "refs/heads/master", "committer_date": 1522313801000, "content_id": "f87fd9e4fe34654f269b0a835928f84a35ed7e0c", "detected_licenses": [ "MIT" ], "directory_id": "1c96fbe22e76e5bb180c4316c10136dff349ac19", "extension": "py", "fi...
2.765625
stackv2
# -*- coding:utf-8 -*- import tornado.web import tornado.ioloop import tornado.options import tornado.httpserver from tornado.web import url import json tornado.options.define("port", type=int, default=9999, help="端口号") class IndexHandler(tornado.web.RequestHandler): def post(self): """ 只能获取Conte...
92
35.26
122
16
932
python
[{"finding_id": "codeql_py/code-injection_f19cc35c04723711_81f1fa47", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
5
true
[ "CWE-094", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/code-injection", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulne...
[ 41, 62, 63, 71, 72 ]
[ null, null, null, null, null ]
[ 29, 20, 20, 20, 20 ]
[ 55, 55, 55, 55, 54 ]
2024-11-18T19:29:52.685084+00:00
1,591,384,099,000
c764c10d7a79689306c2c57908ecb660e70f347e
2
{ "blob_id": "c764c10d7a79689306c2c57908ecb660e70f347e", "branch_name": "refs/heads/master", "committer_date": 1591384099000, "content_id": "72f2c7df5f639b489f7423c2d4af3816b0b8ff13", "detected_licenses": [ "BSD-3-Clause", "MIT", "Apache-2.0" ], "directory_id": "e72fbfb7d6881f24e089966bde1540f...
2.3125
stackv2
# Copyright Philip Morris Products S.A. 2019 import re import os import pickle import numpy as np from names_dataset import NameDataset from .address_parser import parse_address from .Config import Config class NER: def __init__(self, config=None): if config is None: config = Config() ...
362
34.07
120
18
3,350
python
[{"finding_id": "codeql_py/redos_46c8e57ab8e654aa_324af5bb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'www.' and containing many repetit...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'www.' and containing many repetitions of '-'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'www.-.' and containing many repetitions of '-'." ]
[ 24, 24 ]
[ null, null ]
[ 47, 118 ]
[ 77, 148 ]
2024-11-18T19:44:30.647229+00:00
1,606,721,286,000
22c9268459d2fcd4837a8ccc713b3a239322bec3
2
{ "blob_id": "22c9268459d2fcd4837a8ccc713b3a239322bec3", "branch_name": "refs/heads/main", "committer_date": 1606721286000, "content_id": "7f1b57e1143bc90ba3bab038e79c1b753c4a6cba", "detected_licenses": [ "MIT" ], "directory_id": "e19389510318f9cd8b971af9938a139a569f7c14", "extension": "py", "file...
2.453125
stackv2
import flask from flask import Flask, request, render_template from sklearn.externals import joblib import numpy as np from scipy import misc import imageio import keras import matplotlib.pyplot as plt import webbrowser import urllib.request # 모델 로드 # ml/model.py 선 실행 후 생성 from keras.preprocessing.image import ...
157
29.89
112
18
1,174
python
[{"finding_id": "codeql_py/flask-debug_32eea6a39183a1a9_aa1f901c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 157, 52 ]
[ null, null ]
[ 5, 19 ]
[ 51, 42 ]
2024-11-18T19:44:31.368077+00:00
1,579,788,327,000
ff6443344cf4e0b710c623e1bbd1edf2626ac92a
3
{ "blob_id": "ff6443344cf4e0b710c623e1bbd1edf2626ac92a", "branch_name": "refs/heads/master", "committer_date": 1579788327000, "content_id": "0a4b61137443b47b2ddb45ca5fbc83797d87a4f0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1d5e2bc58bf70f6b4f441021fb3acca395950ac3", "extension": "py"...
2.5625
stackv2
import os import errno import configparser from jinja2 import Environment, PackageLoader from .config_schema import validate_config _CONFIG = None def make_config_file_dir(config_file): # Create parent directory if not present if not os.path.exists(os.path.dirname(os.path.realpath(config_file))): ...
140
23.68
87
16
740
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_10ec0e064f309ec9_5feaeafd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 42 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-18T19:44:40.036588+00:00
1,526,876,344,000
6614152b86d1227031eeb366d3670e752280201c
3
{ "blob_id": "6614152b86d1227031eeb366d3670e752280201c", "branch_name": "refs/heads/master", "committer_date": 1526876344000, "content_id": "3f8701c80e121902580a5167031a126311fb432b", "detected_licenses": [ "MIT" ], "directory_id": "be6325e3959ec1cc5db0a97ead0618a120df5737", "extension": "py", "fi...
2.78125
stackv2
""" User Managment API """ import json, re from flask import jsonify, request from flask_restful import Resource from aaxus import rest_api from flask_restful import Resource, reqparse from flask_jwt_extended import jwt_required, get_jwt_identity from aaxus.models.user import User parser = reqparse.RequestParser() par...
129
41.42
102
22
1,068
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3fb544c15cea7399_b31462f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 68 ]
[ null ]
[ 24 ]
[ 35 ]
2024-11-18T19:57:58.151672+00:00
1,515,688,260,000
7cd1c60b8b00fee70cccf5dbc8e4cbe3689a434c
3
{ "blob_id": "7cd1c60b8b00fee70cccf5dbc8e4cbe3689a434c", "branch_name": "refs/heads/master", "committer_date": 1515688260000, "content_id": "9e39971141cab340818f99774ffead3d35022c0b", "detected_licenses": [ "MIT" ], "directory_id": "b9a8f866f6d84b782fe7db0c6bcc926c0d3266d8", "extension": "py", "fi...
2.625
stackv2
# -*- coding: utf-8 -*- import base64 import hashlib import os import smbpasswd from cherrypy.process import wspbus, plugins __all__ = ['PasswordEnginePlugin'] class PasswordEnginePlugin(plugins.SimplePlugin): """ The PasswordEnginePlugin is used to generate hashes for supported algorithms in the LDAP s...
56
26.77
90
17
357
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7f56ba8f228f11eb_051983b8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 52 ]
[ null ]
[ 34 ]
[ 38 ]
2024-11-18T19:58:28.081619+00:00
1,623,723,447,000
6a2a5b8c86b9bd7a71db4a539d6f8b065d2aaf7c
3
{ "blob_id": "6a2a5b8c86b9bd7a71db4a539d6f8b065d2aaf7c", "branch_name": "refs/heads/main", "committer_date": 1623723447000, "content_id": "ef0084c8dd2c624a690daad7a5334afdff1c8c24", "detected_licenses": [ "MIT" ], "directory_id": "ac4f4db6e8be59551fbca6789ac49c088ae66a84", "extension": "py", "file...
2.859375
stackv2
# General utility functions for all parts of the pipeline import os import shutil as sh import sys import time import warnings import subprocess import datetime DATETIME_FORMAT = '%Y%m%d' def printf(str): """Calls print on given argument and then flushes stdout buffer to ensure printed message is displayed r...
413
29.7
158
16
3,040
python
[{"finding_id": "codeql_py/overly-permissive-file_5f5c0f2faee4baca_e551396e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 69 ]
[ null ]
[ 13 ]
[ 38 ]
2024-11-18T20:10:09.265369+00:00
1,619,442,662,000
e9316af3bc40bd6e53aac99d6506d3e0fa0260f7
3
{ "blob_id": "e9316af3bc40bd6e53aac99d6506d3e0fa0260f7", "branch_name": "refs/heads/master", "committer_date": 1619442662000, "content_id": "7cb2b182141b0e2b3e74244d8f98562b04a0eed9", "detected_licenses": [ "MIT" ], "directory_id": "152ebad48730a9cf32090f3cc540afb61e8ab497", "extension": "py", "fi...
3.328125
stackv2
import re from typing import Callable, List, Union from inspect import getmembers, isfunction import importlib from RecordMapper.builders import BuiltinFunctions class InvalidFunctionError(Exception): """ An exception that represents an invalid string reference for a function. """ pass class Fu...
98
39.12
113
15
808
python
[{"finding_id": "codeql_py/overly-large-range_f2499292cf36b402_32964643", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class, and is equivalent to \\['...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class, and is equivalent to \\['()*+,\\-.\\/0-9:\\]." ]
[ 33 ]
[ null ]
[ 59 ]
[ 62 ]
2024-11-18T20:23:11.041444+00:00
1,538,240,695,000
5fdc7cc8c6485892e277e4dd08f44f3dcd421de0
3
{ "blob_id": "5fdc7cc8c6485892e277e4dd08f44f3dcd421de0", "branch_name": "refs/heads/master", "committer_date": 1538240695000, "content_id": "d44094797c31c91778a35f1ed0072b40f0b743b7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ea20d0c2cc3a1d1aecc490c6a7536034e2e22484", "extension": "py"...
2.765625
stackv2
import json import re from http.server import HTTPServer, BaseHTTPRequestHandler from actuator import actuator def date_to_ms(date): return 999 def ms_to_date(milliseconds): return 'foo GMT' hdr_map = [ ('request_id', 'X-Correlation-ID'), ('from', 'Authorization'), ('to', 'To') ] class HamHa...
66
29
99
15
536
python
[{"finding_id": "codeql_py/polynomial-redos_0e7bea64f5e1fd04_f7706073", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'." ]
[ 44 ]
[ null ]
[ 48 ]
[ 68 ]
2024-11-18T20:49:26.531277+00:00
1,631,104,864,000
572f8275a30ef495d24a74f4092e480ed2115772
3
{ "blob_id": "572f8275a30ef495d24a74f4092e480ed2115772", "branch_name": "refs/heads/main", "committer_date": 1631104864000, "content_id": "fbcf09b0b8de1a5ec6972ef379f5b09495b2009c", "detected_licenses": [ "MIT" ], "directory_id": "c0e7bf4e499b5c7e824a67e4cc5a430669917178", "extension": "py", "file...
3.453125
stackv2
# Load input file f = open('day2_input.txt', 'r') inputStrings = f.read().split('\n')[:-1] # Set vars numPasscodes = len(inputStrings) numCodesPartTwo = 0 # Loop trough passwords for passString in inputStrings: passList = passString.split(" ") passRangeTemp = passList[0].split("-") passRange = [int(i) for...
35
24.77
110
10
276
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4b45e1925becf368_1b10e6c3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 32 ]
[ null ]
[ 7 ]
[ 32 ]
2024-11-18T20:49:38.228968+00:00
1,474,486,532,000
9e4a46f7bc6773649e51f3b523fa8aaa10f52062
2
{ "blob_id": "9e4a46f7bc6773649e51f3b523fa8aaa10f52062", "branch_name": "refs/heads/master", "committer_date": 1474486532000, "content_id": "528c14fcd0d1b09208689ff30defd86084e2a099", "detected_licenses": [ "MIT" ], "directory_id": "edcd3847115ae76b68195bdda54e04ed06a04318", "extension": "py", "fi...
2.3125
stackv2
import json from dateutil.parser import parse as parse_date from django.contrib.contenttypes.models import ContentType from django.core.cache import cache from django.http import Http404 from django.utils import timezone, dateparse from rest_framework import viewsets from rest_framework.permissions import IsAdminUse...
204
34.51
122
18
1,485
python
[{"finding_id": "codeql_py/stack-trace-exposure_8d06484a3fbf9dd2_6f361c5e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 138 ]
[ null ]
[ 13 ]
[ 21 ]
2024-11-18T20:49:41.248262+00:00
1,619,314,241,000
24842d8ceaee738f36e389af1367fd4ea2a3c25f
2
{ "blob_id": "24842d8ceaee738f36e389af1367fd4ea2a3c25f", "branch_name": "refs/heads/master", "committer_date": 1619314241000, "content_id": "71c8f8f2acf5f43b286f431b1c672baef16a0898", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ce735585440c77569bdfb4cad59802b846b8ea0e", "extension": "py"...
2.359375
stackv2
from flask import Flask, jsonify, request, current_app from functools import wraps from werkzeug.routing import BaseConverter from werkzeug.contrib.fixers import ProxyFix import yaml import re import datetime import logging import os import sys import Queue import threading # Configuration and static variables def op...
187
30.86
79
17
1,349
python
[{"finding_id": "codeql_py/log-injection_89e5041e854a025a_f55dee29", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 148 ]
[ null ]
[ 40 ]
[ 52 ]
2024-11-18T20:50:28.545173+00:00
1,596,214,886,000
a4767508011cae4e32c5feb163814f6c2d6c3c12
3
{ "blob_id": "a4767508011cae4e32c5feb163814f6c2d6c3c12", "branch_name": "refs/heads/master", "committer_date": 1596214886000, "content_id": "8fc90e7f5bc20afc4920a488526e9cecd4cfb672", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "227d6243a236cb5c210e2918ac59049de2ad2fad", "extension": "p...
2.75
stackv2
import hashlib from DB import Query class Credentials: @staticmethod def passwordHasher(username, passwd): query = Query() shaObj = hashlib.sha256() shaObj.update(passwd.encode()) print(shaObj.hexdigest()) result = query.userValidate(username, shaObj.hexdigest()) ...
44
28.5
83
13
280
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1155930ae9ff3a70_a09f10a2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 9, 26 ]
[ null, null ]
[ 23, 23 ]
[ 38, 38 ]
2024-11-18T20:50:29.922704+00:00
1,633,938,367,000
48a3d05ef9a89953cefb33a22f26fd4f7423cc87
3
{ "blob_id": "48a3d05ef9a89953cefb33a22f26fd4f7423cc87", "branch_name": "refs/heads/master", "committer_date": 1633938377000, "content_id": "9993ceda13c23cb0fd2ef16451f415a2671558fc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d7fa504c3426d9bb2e3237858cf5349a79d3b0ae", "extension": "py"...
2.515625
stackv2
import os.path import logging from jinja2 import FileSystemLoader, Environment, exceptions logger = logging.getLogger(__name__) def render(charm_dir, source, context): """ Render a template. The context should be a dict containing the values to be replaced in the template. """ templates_dir ...
24
28
76
12
143
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_10bbe3b73fbbf4cd_963e32f6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ null ]
[ 20 ]
[ 71 ]
2024-11-18T20:50:38.605189+00:00
1,692,107,468,000
6d750e89b06318b214831ace72ca360e36502c5f
2
{ "blob_id": "6d750e89b06318b214831ace72ca360e36502c5f", "branch_name": "refs/heads/master", "committer_date": 1692107468000, "content_id": "ccfc609a7a41f0da3a05de42924f0c17eb86a03b", "detected_licenses": [ "MIT" ], "directory_id": "8454441f899c3beb9fcea26cffc2f4c3cf75ff6a", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python3 import sys import time import getpass import paramiko import string ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ssh.connect('109.233.57.94', username='dockesc', password='B9Go9eGS') shell = ssh.invoke_shell() # shell.settimeout(0....
48
22.71
76
16
308
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bfabc7cdad1ca821_973342a2", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 10 ]
[ null ]
[ null ]
[ 58 ]
2024-11-18T20:50:52.284521+00:00
1,620,160,061,000
3131fdd19e286f8473706a359b04e61c9ff1112d
3
{ "blob_id": "3131fdd19e286f8473706a359b04e61c9ff1112d", "branch_name": "refs/heads/main", "committer_date": 1620160061000, "content_id": "ba9d2a1801107a9278dc40b6344cf7ce7615012e", "detected_licenses": [ "MIT" ], "directory_id": "885b63cc836f4d8f95247d8407096c7053b30c26", "extension": "py", "file...
2.875
stackv2
"""API functions""" import requests import os import datetime import pandas as pd from pickle import load from fastapi import APIRouter, HTTPException, Depends from pydantic import BaseModel, BaseSettings, SecretStr from bs4 import BeautifulSoup from app.ml import City, validate_city from app.data.files.state_abbr imp...
320
29.54
149
16
2,284
python
[{"finding_id": "codeql_py/partial-ssrf_4d75cb8df4c94fb5_367758bf", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 97 ]
[ null ]
[ 16 ]
[ 33 ]
2024-11-18T20:50:55.994607+00:00
1,622,321,349,000
cc742ef42113959bc2004b7b4142c59fbb3b7f6d
3
{ "blob_id": "cc742ef42113959bc2004b7b4142c59fbb3b7f6d", "branch_name": "refs/heads/main", "committer_date": 1622321349000, "content_id": "8797d00a9f6d86bb2213d1d67bec4fe06ad20372", "detected_licenses": [ "MIT" ], "directory_id": "f9bd964e087ca2987c302ea51b22585c73dd6be9", "extension": "py", "file...
2.5625
stackv2
import re import string from contractions import CONTRACTION_MAP from collections import Counter from spacy.lang.en.stop_words import STOP_WORDS import numpy as np import torch import random def initialize(): torch.manual_seed(0) np.random.seed(0) random.seed(0) def expand_contractions(text): contra...
103
27.28
90
15
757
python
[{"finding_id": "codeql_py/overly-large-range_1e8bad12956fb1cd_16f5c0bd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 53, 53, 53, 53 ]
[ null, null, null, null ]
[ 34, 37, 40, 49 ]
[ 38, 41, 44, 53 ]
2024-11-18T20:51:12.867038+00:00
1,544,615,245,000
928d14ca7e31f624d81c081096ccb531a3bf9721
3
{ "blob_id": "928d14ca7e31f624d81c081096ccb531a3bf9721", "branch_name": "refs/heads/master", "committer_date": 1544615245000, "content_id": "6719e18826af5698f3a3c9b73b888ad6b860ab9e", "detected_licenses": [ "MIT" ], "directory_id": "fd1be7a6a93b8467b25c281f07dd879db64bfb32", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python import argparse try: import ConfigParser except ImportError: import configparser as ConfigParser from jinja2 import Environment, FileSystemLoader parser = argparse.ArgumentParser(description='Get variables from config file and update input file') parser.add_argument('-c', '--config', re...
24
31.88
112
12
166
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_136bc6cb1447182d_e7b108c9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 19 ]
[ null ]
[ 7 ]
[ 89 ]
2024-11-18T21:13:47.785551+00:00
1,559,811,670,000
f223977f3ddc0c5baebfd207dcbc0789f13379b7
2
{ "blob_id": "f223977f3ddc0c5baebfd207dcbc0789f13379b7", "branch_name": "refs/heads/master", "committer_date": 1559811670000, "content_id": "4e8e4129594b1c4828272a6c285a0b1b83f88f3d", "detected_licenses": [ "MIT" ], "directory_id": "5da8533a6896e11f24825c0c727ead460d517cc7", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/python3.6 """ Generates static site from CodeCommit source and deploys to production S3 Bucket Many thanks to MMusket and Alestic from which i adapted their code. https://github.com/mmusket/s3-hosting-guide https://github.com/alestic/aws-lambda-codepipeline-site-generator-hugo """ from __future__ import pri...
174
34.95
116
14
1,495
python
[{"finding_id": "codeql_py/overly-permissive-file_7ae8853b0a696d0d_62c92509", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 89 ]
[ null ]
[ 5 ]
[ 29 ]
2024-11-18T21:13:52.523848+00:00
1,571,908,514,000
5f4c1e43fed967ca067fb802bb7c1511ed9e9b22
3
{ "blob_id": "5f4c1e43fed967ca067fb802bb7c1511ed9e9b22", "branch_name": "refs/heads/master", "committer_date": 1571908514000, "content_id": "3329321e7135b2f94a62c8af5405b18637fda8ee", "detected_licenses": [ "Apache-2.0" ], "directory_id": "113226d1db872a013e85c3ca355f20159bcbd3d5", "extension": "py"...
2.890625
stackv2
# -*- coding: utf-8 -*- # @Time : 2019/9/27 12:32 # @Author : # @Site : # @File : CodeGeneratorCore.py # @Software: PyCharm import os from jinja2 import Environment, FileSystemLoader class CoreCodeGenerator(object): def __init__(self, template_dir): self.jinja = None self.template_dir = tem...
64
25.12
76
15
401
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cd05d0a8fe55e072_e19dedd9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ null ]
[ 22 ]
[ 77 ]
2024-11-18T21:14:10.896961+00:00
1,586,877,692,000
8ab137d91c4baa94c458cb40e7c65ff4f0984925
3
{ "blob_id": "8ab137d91c4baa94c458cb40e7c65ff4f0984925", "branch_name": "refs/heads/master", "committer_date": 1586877692000, "content_id": "b839b6bdc59cbf7c465b3a05bdb30f3a011c165c", "detected_licenses": [ "MIT" ], "directory_id": "8bcb090f8645378dcec756424ccc64e608580528", "extension": "py", "fi...
2.515625
stackv2
import os import sys import random import string import subprocess DOCKER_COMPOSE_PATH = "/srv/deployment/docker-compose.yml" class DeployService: def __init__(self): self.fetchDockerComposeServices() self.checkDockerComposeFile() self.loginEnabled = False def fetchDockerCom...
74
36.22
130
17
598
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3b06a91c9b9520dc_dd51933d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text." ]
[ 49 ]
[ null ]
[ 19 ]
[ 22 ]
2024-11-18T21:14:18.052103+00:00
1,635,079,698,000
672e38b959cdf56b1d96317e21914944195db36a
2
{ "blob_id": "672e38b959cdf56b1d96317e21914944195db36a", "branch_name": "refs/heads/master", "committer_date": 1635081679000, "content_id": "2f7ec5a0824990fa30180a9452d5aea565cc1c4e", "detected_licenses": [ "MIT" ], "directory_id": "d22f8cd1a834f706d2c0cd77a814414cb4650265", "extension": "py", "fi...
2.5
stackv2
import base64 import os from dataclasses import dataclass, field from hashlib import sha3_512 import pymongo from common import datatypes from common.document import Document, DocumentDefaults @dataclass class AccountDefaults(DocumentDefaults): last_server: Int8 = None last_character: Int32 = None salt:...
76
26.08
96
19
470
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3677a38c2a526832_0dce2842", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3512) that is i...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA3512) that is insecure for password hashing, since it is not a computationally...
[ 54, 66 ]
[ null, null ]
[ 51, 53 ]
[ 75, 77 ]
2024-11-18T21:14:41.989265+00:00
1,619,629,925,000
9fb7620bffd4a8347cf58b0c6836c9d67c39f9cf
3
{ "blob_id": "9fb7620bffd4a8347cf58b0c6836c9d67c39f9cf", "branch_name": "refs/heads/master", "committer_date": 1619629925000, "content_id": "473a2cceafe3ebc425c75e9d281bcc51b3e2eba7", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c1e3edd93807e06299bc9443a1d71a5e04220c51", "extension": "p...
3.1875
stackv2
#!/usr/bin/env python3 from os import path import sqlite3 from sys import argv # Usage: # ./user-lookup.py <USER> <PASSWORD> # Look up the secret word for the given user, assuming the given password is # correct. Reset the database by deleting the file "users.db". DB_FILE = "users.db" if not path.exists(DB_FILE): ...
41
20.56
76
9
228
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_898c308870f658bd_8901e950", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 38 ]
[ null ]
[ 11 ]
[ 30 ]
2024-11-18T21:14:44.528986+00:00
1,604,074,443,000
7bd32891a0325694dbf5324bb8d1a5cedcb12358
3
{ "blob_id": "7bd32891a0325694dbf5324bb8d1a5cedcb12358", "branch_name": "refs/heads/master", "committer_date": 1604074443000, "content_id": "67d3a8ab745ff0edd01fdf1dd9650b5cd05d46d4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "17b660ab0b2f1ae3552dc003e0b84e88e9d3350c", "extension": "p...
2.71875
stackv2
""" abc-classroom.distribute ======================== Take a template directory and distribute it """ import os import subprocess import jinja2 # current directory HERE = os.path.dirname(os.path.abspath(__file__)) def find_notebooks(base_path): """Find all notebooks below base_path and return path to them""" ...
62
24.05
78
16
346
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4a1c72512815db27_17b049b1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 34 ]
[ null ]
[ 9 ]
[ 34 ]
2024-11-18T20:10:35.114368+00:00
1,540,952,731,000
66cde5d27fed71b6eb202e26bdee5bcc775477b0
3
{ "blob_id": "66cde5d27fed71b6eb202e26bdee5bcc775477b0", "branch_name": "refs/heads/master", "committer_date": 1540952731000, "content_id": "8811c8fb6c9665fa88359e7023bd69d78283d383", "detected_licenses": [ "MIT" ], "directory_id": "b247cd521420ae9206dd744b8a8c7abe49f2c3c4", "extension": "py", "fi...
2.859375
stackv2
### import utils import re import itertools import numpy as np from sklearn.model_selection import train_test_split as sklearn_train_test_split from keras.preprocessing.sequence import pad_sequences def preprocessing(data_df, is_training): ### Create embedding matrix def text_wordlist(text): """ ...
144
33.9
88
19
1,318
python
[{"finding_id": "codeql_py/overly-large-range_ddc1e234ff93f762_27ad715e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]." ]
[ 22 ]
[ null ]
[ 43 ]
[ 46 ]
2024-11-18T20:10:55.354739+00:00
1,617,998,526,000
bc058e104d80a7ef11f3bb9904b6ffc6d078e5ef
3
{ "blob_id": "bc058e104d80a7ef11f3bb9904b6ffc6d078e5ef", "branch_name": "refs/heads/master", "committer_date": 1617998625000, "content_id": "8227b19f2e9fcafcc6653264b13f6552826e1561", "detected_licenses": [ "MIT" ], "directory_id": "6a7066c0f05de9df4adda0e542a6de4e067e2c05", "extension": "py", "fi...
2.5625
stackv2
from base64 import standard_b64encode from flask import Flask, jsonify, redirect, render_template, request from predict import get_prediction from transform import thumbnailify_image, draw_bounding_boxes, img_from_ndarray, imgdata_from_ndarray app = Flask(__name__) @app.route('/', methods=['GET', 'POST']) def uploa...
66
37.59
140
17
603
python
[{"finding_id": "codeql_py/stack-trace-exposure_c8d02a8a465cc0d2_08005356", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-601", "CWE-601" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provid...
[ 22, 59, 16, 53 ]
[ null, null, null, null ]
[ 28, 28, 29, 29 ]
[ 79, 79, 40, 40 ]
2024-11-18T21:11:51.894572+00:00
1,595,592,683,000
a2cc5493bf34bbcdf2dcfc94eec2a8d5dc03d1c6
4
{ "blob_id": "a2cc5493bf34bbcdf2dcfc94eec2a8d5dc03d1c6", "branch_name": "refs/heads/master", "committer_date": 1595592683000, "content_id": "fd04bff696a08c777299621f8dee5c78b138ba9f", "detected_licenses": [ "MIT" ], "directory_id": "f891182f29b1f7f195b5b87c94e5f9a58cd96b5a", "extension": "py", "fi...
3.9375
stackv2
# program used to check if password is present in pwned database #used pwned api import hashlib import requests """Returns number of times password was seen in pwned database. Args: password: password to check Returns: count: number of times the password was seen in the pwned database. ...
47
23.51
84
15
287
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0cbea1046c743d39_cab3ecc2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that i...
[ 42, 20 ]
[ null, null ]
[ 9, 27 ]
[ 64, 51 ]
2024-11-18T21:25:55.879539+00:00
1,426,279,497,000
5fe516b43f53d30857cd6fda7e6e2067a4c06ae8
3
{ "blob_id": "5fe516b43f53d30857cd6fda7e6e2067a4c06ae8", "branch_name": "refs/heads/master", "committer_date": 1426279497000, "content_id": "6d8c1fe11047e54fa8f539ca4e42ad4b26af6b12", "detected_licenses": [ "MIT" ], "directory_id": "53218b16d6aa0e6fefee2de272f4221e73b3c2d6", "extension": "py", "fi...
2.65625
stackv2
import arrow import jinja2 import json if __name__ == "__main__": # Load the template template_loader = jinja2.FileSystemLoader('.') template_env = jinja2.Environment(loader=template_loader) index_template = template_env.get_template('index.tpl.html') # Load the delays with open('dela...
57
31.49
71
17
406
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d2bb8e90c64454e9_c4718364", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ null ]
[ 20 ]
[ 62 ]
2024-11-18T21:26:04.851083+00:00
1,429,354,017,000
466fb6f1a9428f405629f2cdbf52bd7b2bd7607e
2
{ "blob_id": "466fb6f1a9428f405629f2cdbf52bd7b2bd7607e", "branch_name": "refs/heads/master", "committer_date": 1429354017000, "content_id": "1c27ec7f951d07e917478ed051571f5f4dbc3ee7", "detected_licenses": [ "MIT" ], "directory_id": "469dee03907f000a5d99ca3fca41a312f69ce291", "extension": "py", "fi...
2.359375
stackv2
"""Code to push events to users.""" import logging import flask import pusher from google.appengine.api import namespace_manager from google.appengine.ext import ndb from common import public_creds from appengine import pusher_client, rest # pylint: disable=invalid-name blueprint = flask.Blueprint('pushrpc', __nam...
183
29.5
77
14
1,344
python
[{"finding_id": "codeql_py/log-injection_dee21070a5d8cf43_ab2f24f8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 60, 107, 135 ]
[ null, null, null ]
[ 49, 44, 65 ]
[ 55, 52, 77 ]
2024-11-18T21:51:44.238115+00:00
1,621,805,076,000
089120813c98fba4e1386addf0f2da3a647bda73
3
{ "blob_id": "089120813c98fba4e1386addf0f2da3a647bda73", "branch_name": "refs/heads/master", "committer_date": 1621805076000, "content_id": "7f020c399a747575f1f1a691c2fc58ff42bcf4b2", "detected_licenses": [ "MIT" ], "directory_id": "e639315f446f344a320811b75264659e758920c2", "extension": "py", "fi...
2.5625
stackv2
import streamlit as st import pandas as pd import json import os from datetime import datetime import dicescoring import numpy as np import io # from sklearn.metrics import (accuracy_score, auc, f1_score, precision_score, recall_score, # mean_absolute_error, mean_squared_error, r2_score) s...
110
42.85
136
21
1,069
python
[{"finding_id": "codeql_py/path-injection_7a20548954870160_e54d3538", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 72 ]
[ null ]
[ 27 ]
[ 46 ]
2024-11-18T21:51:47.569910+00:00
1,554,504,134,000
05e60a1b004d2d8d479d13fcdc8203cf91f54224
3
{ "blob_id": "05e60a1b004d2d8d479d13fcdc8203cf91f54224", "branch_name": "refs/heads/master", "committer_date": 1554504134000, "content_id": "e4c6be08cf38bc65819ee10df162072d722e68db", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6c0625e2a550b28be0769e9a47131f239e7012e3", "extension": "py"...
2.640625
stackv2
# -*- coding: utf-8 -*- # Copyright 2019, Paul B. Monday # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable l...
62
27.13
80
13
428
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a08eaad9b921454c_ba6f9238", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 44, 54 ]
[ null, null ]
[ 11, 11 ]
[ 12, 12 ]
2024-11-18T21:52:17.374164+00:00
1,553,947,852,000
37a91b4720b8d0ac45212675c2ff0061e012bffd
3
{ "blob_id": "37a91b4720b8d0ac45212675c2ff0061e012bffd", "branch_name": "refs/heads/master", "committer_date": 1553947852000, "content_id": "5737d47a6dec7c3c6888ca703069c0a432b60436", "detected_licenses": [ "MIT" ], "directory_id": "19ba74fb79e6d850b72bbd7b1cb45cfc4778a4a0", "extension": "py", "fi...
3.015625
stackv2
""" Make a smaller bibliography for all those proposals. To run simply use: > bibchen path/to/file.tex """ import os import argparse import subprocess # Define the acceptable fontsizes. TODO: Accept a number too? fontsizes = ['Huge', 'huge', 'LARGE', 'Large', 'large', 'normalsize', 'small', 'footnotesi...
160
34.23
78
15
1,466
python
[{"finding_id": "codeql_py/overly-permissive-file_d9d5dc2cf90fb9b9_4ec2c0ed", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 84, 148 ]
[ null, null ]
[ 5, 5 ]
[ 33, 33 ]
2024-11-18T21:52:24.979728+00:00
1,507,164,480,000
13d5220c3f0581e3b45856fa1c26ed2771010af1
3
{ "blob_id": "13d5220c3f0581e3b45856fa1c26ed2771010af1", "branch_name": "refs/heads/master", "committer_date": 1507164480000, "content_id": "3e84cc1068601ab97c079d43639f6adbdfebdf39", "detected_licenses": [ "MIT" ], "directory_id": "38e13c018a6ce591199ed3792d21956d2bab470d", "extension": "py", "fi...
2.609375
stackv2
import youtube_dl from pymongo import MongoClient from flask import Flask, request import time import json app = Flask(__name__) ydl_opts={} client = MongoClient() db = client.rXive @app.route("/") def index(): return "Hello, world" @app.route("/getlink", methods=["POST","GET"]) def url_post_handle(): if req...
39
23
66
14
230
python
[{"finding_id": "codeql_py/flask-debug_2d4e1d097a2b8a80_0ee2a953", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 39, 20 ]
[ null, null ]
[ 5, 16 ]
[ 24, 40 ]
2024-11-18T21:52:30.405992+00:00
1,613,975,265,000
5d02555a7ea74f29825ed320c3e4235c26335ea7
3
{ "blob_id": "5d02555a7ea74f29825ed320c3e4235c26335ea7", "branch_name": "refs/heads/main", "committer_date": 1613975265000, "content_id": "bf6cfd33e2b323ec41a53611ae5c552c88a3eaec", "detected_licenses": [ "MIT" ], "directory_id": "718ab122e93039871d4a009c7444a5e3e7e9eed6", "extension": "py", "file...
2.625
stackv2
#!/usr/bin/python3 import logging, time, os, subprocess from systemd import journal import RPi.GPIO as GPIO # constants LEVER_PIN = 4 LOG_FILE = '/var/log/veni-sh/remote_access-block.log' SSH_TUNNEL_CMD = ['/usr/bin/ssh', '-N', '-F', '/home/veni-sh/.ssh/config', 'sanvewxyz-rpi-veni000-ssh-tunnel'] SSH_TUNNEL_CONNECT_...
79
27.48
110
16
562
python
[{"finding_id": "codeql_py/overly-permissive-file_9e9757e7cf93ef2a_d0ac4dab", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group readable." ]
[ 20 ]
[ null ]
[ null ]
[ 26 ]
2024-11-18T21:00:04.940244+00:00
1,678,033,293,000
210870f675d9be99d3b2f52f8e5a4042e9254044
3
{ "blob_id": "210870f675d9be99d3b2f52f8e5a4042e9254044", "branch_name": "refs/heads/master", "committer_date": 1678033293000, "content_id": "7e5c15a07bea4d059d8a1b87b69b293c850624ad", "detected_licenses": [ "MIT" ], "directory_id": "561f1571906c68e5ea09b6b2400821f47e2dd0b8", "extension": "py", "fi...
3.078125
stackv2
#!/usr/bin/python3 from bs4 import BeautifulSoup import requests import platform import sys import re import os MAC_URL = "http://standards-oui.ieee.org/oui.txt" def usage(): print("Usage: MACLookup [MAC ADDRESS]") print("\nAccepted formats:" "\n\t- MACLookup FC:FB:FB:01:FA:21" "\n\t- MAC...
68
30.16
88
16
557
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0b6affac548c0de4_abf8b985", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 65 ]
[ null ]
[ 19 ]
[ 38 ]
2024-11-18T21:10:28.171557+00:00
1,439,391,453,000
06606c1679c10609820710b57e49e4d0576157b5
2
{ "blob_id": "06606c1679c10609820710b57e49e4d0576157b5", "branch_name": "refs/heads/master", "committer_date": 1439391453000, "content_id": "03bee0ced2b8db9d23917777c4a049cf7dcd2319", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f84f2212eed70db49f5165d68c4625062936644e", "extension": "p...
2.40625
stackv2
""" Copyright (c) 2015 Red Hat, Inc All rights reserved. This software may be modified and distributed under the terms of the BSD license. See the LICENSE file for details. """ import json import argparse import pkg_resources from base64 import b64encode def generate_json(args): with open(args.cert, "r") as fpc...
71
29.06
90
18
436
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_284f61d108bb7ecb_95043b2a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 30 ]
[ null ]
[ 11 ]
[ 43 ]
2024-11-18T21:10:29.214413+00:00
1,693,598,748,000
e986d3fedca92f087d3809c13a95b48adea026ca
2
{ "blob_id": "e986d3fedca92f087d3809c13a95b48adea026ca", "branch_name": "refs/heads/master", "committer_date": 1693598748000, "content_id": "948e1f985c3d4e4825952c69910bb7a5be651c94", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2cdfd562d865036e6f0862c9f377dd1e88e2eb32", "extension": "py"...
2.453125
stackv2
#!/usr/bin/env python3 """ Quick script for ingesting LiLT metadata. Author: Matt Post July 2020 """ import csv import lxml.etree as etree import os import shutil import sys import anthology from anthology.utils import make_simple_element, indent, compute_hash_from_file from normalize_anth import normalize from likel...
124
34.08
93
18
984
python
[{"finding_id": "codeql_py/overly-permissive-file_9fdd29f718ad8dc7_e8ec880e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 98 ]
[ null ]
[ 13 ]
[ 39 ]
2024-11-18T21:10:29.861661+00:00
1,384,897,808,000
ff349b1d71eff5b31bede22ad91b49927f825fb2
3
{ "blob_id": "ff349b1d71eff5b31bede22ad91b49927f825fb2", "branch_name": "refs/heads/master", "committer_date": 1384897808000, "content_id": "fe28b2c7f285d4412e5062c6216c868fdaef346a", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "99fe041f58bf5d60729172945261e6d13d847e62", "extension": "p...
2.53125
stackv2
# -*- coding: utf-8 -*- """ --------------------------- volt.plugin.builtins.atomic --------------------------- Atom feed generator plugin. :copyright: (c) 2012 Wibowo Arindrarto <bow@bow.web.id> :license: BSD """ from __future__ import with_statement import os import sys from datetime import datetime from jinja2 ...
96
28.64
84
17
628
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_212a84745ea895bb_7c75032e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 81 ]
[ 82 ]
[ 15 ]
[ 72 ]
2024-11-18T21:10:34.421763+00:00
1,619,524,079,000
8bcf42adcd4c0151a9ab385ad0895b0e53586187
2
{ "blob_id": "8bcf42adcd4c0151a9ab385ad0895b0e53586187", "branch_name": "refs/heads/master", "committer_date": 1619524079000, "content_id": "af3938c10e454613039f09a8632bb87599e0dfd3", "detected_licenses": [ "MIT" ], "directory_id": "6c978a74e94771c37b387b9ed7b09411dffe814d", "extension": "py", "fi...
2.5
stackv2
import numpy as np import sys import config from packageopt import * ARGS = sys.argv[1:] # ticker date _SECCODES = list(np.unique(ARGS[::2])) _DATES = list(np.unique([int(x) for x in ARGS[1::2]])) HYPERPARAMS = { 'DATE_INITIAL': 20190603, # initial date of start calculation 'TIME_INITIAL': 11000000...
190
44.46
140
22
2,074
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_65de34741c8ed3ea_230448fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 185 ]
[ null ]
[ 19 ]
[ 26 ]
2024-11-18T21:10:49.748812+00:00
1,574,806,421,000
30dfdd5b95ce815c8eba40defdecf9e1c13b752f
2
{ "blob_id": "30dfdd5b95ce815c8eba40defdecf9e1c13b752f", "branch_name": "refs/heads/master", "committer_date": 1574806421000, "content_id": "45be5ee19b26bad5fc2227c8d743860dd58e6b7f", "detected_licenses": [ "MIT" ], "directory_id": "a36b2939b42064bc5c45a6951136d8bd55891d3d", "extension": "py", "fi...
2.3125
stackv2
from flask import Flask, render_template, url_for, flash, redirect, request, jsonify from sqlalchemy import create_engine from sqlalchemy.orm import sessionmaker from db_setup import Base, Plant, Device import psutil import datetime import water import os app = Flask(__name__, static_url_path='/static') # Connect to ...
398
31.2
112
19
2,808
python
[{"finding_id": "codeql_py/flask-debug_dc8751968cf4eca4_05963ecf", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 398, 177, 309, 312 ]
[ null, null, null, null ]
[ 5, 16, 16, 16 ]
[ 50, 33, 84, 32 ]
2024-11-18T21:10:51.858324+00:00
1,565,212,670,000
236673ec6cd33a8818bb9f9d3841f39906a0cf50
2
{ "blob_id": "236673ec6cd33a8818bb9f9d3841f39906a0cf50", "branch_name": "refs/heads/master", "committer_date": 1565212670000, "content_id": "8fd4bd4b3822b819ea7a04731baf4144cc125002", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "720c1db25c75f1a048e2c2091b92f791b8e86421", "extension": "p...
2.484375
stackv2
from flask import render_template, url_for, flash, redirect,request from flaskblog import app, db, b_c from flaskblog.forms import RegistrationForm, LoginForm, UpdateAccountForm from flaskblog.models import User, Post from flask_login import login_user, current_user, logout_user, login_required posts=[ { 'author': ...
101
27.32
85
16
700
python
[{"finding_id": "codeql_py/url-redirection_a8c84d7201d8ef20_4bdadaf9", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 70 ]
[ null ]
[ 20 ]
[ 29 ]
2024-11-18T21:23:31.107605+00:00
1,531,834,965,000
22cb31d138ed6ebd3ee35efb67e53b4954b4aa29
2
{ "blob_id": "22cb31d138ed6ebd3ee35efb67e53b4954b4aa29", "branch_name": "refs/heads/master", "committer_date": 1531834965000, "content_id": "51e6df9196e9c36af4d2a69ea980908df51aa7e9", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "3f15d04cf44a6f56249efa121813c00edb23f3ac", "extension": "p...
2.421875
stackv2
from flask import Flask, request, Response, render_template import sdv import StringIO import urllib2 import json app = Flask(__name__, static_folder='public', static_url_path='') @app.route('/validate', methods=['POST', 'GET']) def validate_ws(): post_data = request.get_data() url = request.args.get('url') ...
58
29.43
105
15
414
python
[{"finding_id": "codeql_py/stack-trace-exposure_27e58ce310ab6bd9_1ef5fbcf", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-215", "CWE-918" ]
[ "py/stack-trace-exposure", "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 21, 58, 53 ]
[ null, null, null ]
[ 21, 5, 29 ]
[ 40, 37, 49 ]
2024-11-18T21:23:35.989536+00:00
1,677,702,854,000
74576914d7117caffb09a9fd3646d33320db26ff
3
{ "blob_id": "74576914d7117caffb09a9fd3646d33320db26ff", "branch_name": "refs/heads/main", "committer_date": 1677702854000, "content_id": "c3be753f91fb8ca61fd9bdfb9d70f7bfec6a83ca", "detected_licenses": [ "MIT" ], "directory_id": "2e42938e48b54fc2fbdc72c0c251f63d43710f68", "extension": "py", "file...
2.65625
stackv2
"""Module to deal with ipsw files.""" import os import shutil import sys import requests from bs4 import BeautifulSoup from remotezip import RemoteZip def grab_file(url: str, filename: str) -> str: """Partialzip file from remote server.""" if "developer.apple.com" in url: return None with RemoteZ...
139
28.71
79
16
1,001
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_31fe6f174e8b91ac_805e9554", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [developer.apple.com](1) may be at an arbitrary positio...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [developer.apple.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 13 ]
[ null ]
[ 8 ]
[ 36 ]
2024-11-18T21:23:41.645235+00:00
1,586,429,096,000
a0477608ceca2c17dffba3a42221dd06ba7b2fc3
2
{ "blob_id": "a0477608ceca2c17dffba3a42221dd06ba7b2fc3", "branch_name": "refs/heads/master", "committer_date": 1586429096000, "content_id": "0fa7f4941abc9bc5503d5dc5b015dee38421f0de", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4079e201f56d367b1106b93fec93765d8afd8543", "extension": "py"...
2.359375
stackv2
''' Copyright 2019 IBM Corporation Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software di...
143
36.31
116
17
1,198
python
[{"finding_id": "codeql_py/stack-trace-exposure_380705fd69dcc9ae_db8bba43", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 80, 135, 142 ]
[ null, null, null ]
[ 20, 20, 5 ]
[ 28, 28, 59 ]
2024-11-18T21:37:21.850978+00:00
1,608,648,615,000
9e19c7cd9d7570bbc35afdd4ae5a20a434573a34
3
{ "blob_id": "9e19c7cd9d7570bbc35afdd4ae5a20a434573a34", "branch_name": "refs/heads/master", "committer_date": 1608648615000, "content_id": "ca0a33cdc955b57ba103c03ee557fc7035d032f1", "detected_licenses": [ "MIT" ], "directory_id": "91c2d18fe74a943f2087abf099c54410436ef874", "extension": "py", "fi...
2.515625
stackv2
from flask import Flask, jsonify, request, send_file from bs4 import BeautifulSoup from ics import Calendar, Event import requests import urllib3 import urllib app = Flask(__name__) app.config["calendar"] = "/my.ics" @app.route('/api/calendar/<string:year>/<string:month>') def checkOutput(year, month): if int(m...
45
28.18
118
18
363
python
[{"finding_id": "codeql_py/path-injection_91db16ff8e50a9ce_1f265aef", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed...
3
true
[ "CWE-022", "CWE-022", "CWE-918" ]
[ "py/path-injection", "py/path-injection", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request dep...
[ 39, 42, 17 ]
[ null, null, null ]
[ 15, 22, 12 ]
[ 23, 30, 119 ]
2024-11-18T21:59:06.449302+00:00
1,598,912,874,000
d055dbe207aab1227876f9c3e24e7a725e9be2ee
3
{ "blob_id": "d055dbe207aab1227876f9c3e24e7a725e9be2ee", "branch_name": "refs/heads/master", "committer_date": 1598912874000, "content_id": "4a63861c9cd3870f5a769a417dce9d00ca1ad6de", "detected_licenses": [ "MIT" ], "directory_id": "62db3d7eb8f50a66a6eb898d93d212dd7215d2cf", "extension": "py", "fi...
2.609375
stackv2
#! /usr/bin/env python3 from flask import Flask, request, abort, jsonify import database as db import json FEVER_START: str = 'FEVER_START_EVENT' FEVER_END: str = 'FEVER_END_EVENT' app = Flask(__name__) app.config["JSON_SORT_KEYS"] = False @app.route('/temperature', methods=['GET']) def show_raw_temperature(): ...
186
30.11
112
17
1,283
python
[{"finding_id": "codeql_py/flask-debug_952187c39f2340f0_1bd7d35a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 186, 50 ]
[ null, null ]
[ 5, 12 ]
[ 35, 20 ]
2024-11-18T21:59:07.912770+00:00
1,599,194,318,000
fe80d4d52bbfcac77932ae40f57e2be351a44a71
5
{ "blob_id": "fe80d4d52bbfcac77932ae40f57e2be351a44a71", "branch_name": "refs/heads/master", "committer_date": 1599194318000, "content_id": "4f4640d537cf2547d8b0842080f1493297d393aa", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "a9d4e47aebbfac7d5f442da3bc5639e1ec65d508", "extension": "p...
4.65625
stackv2
# Python List # List in python is implemented to store the sequence of various type of data. # However, python contains six data types that are capable to store the sequences # but the most common and reliable type is list. # # A list can be defined as a collection of values or items of different types. # The items in ...
32
51.19
166
8
459
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fd48214141d05430_ab11ffaa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 19 ]
[ null ]
[ 7 ]
[ 84 ]
2024-11-18T22:11:29.480366+00:00
1,660,096,781,000
8158c40afed82906dc46c62aef69ea507329a26e
2
{ "blob_id": "8158c40afed82906dc46c62aef69ea507329a26e", "branch_name": "refs/heads/master", "committer_date": 1660096781000, "content_id": "0333e56168b0dd62d908a26063b1e8d29ed68a2a", "detected_licenses": [ "MIT" ], "directory_id": "dbc68435b68ab570c927972d2df910d4d11d08a0", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/python import jinja2 import json with open('source.json') as f: data = json.load(f) #with open('gov.json') as f: # data2 = json.load(f) templateLoader = jinja2.FileSystemLoader(searchpath="./") templateEnv = jinja2.Environment(loader=templateLoader) TEMPLATE_FILE = "template.tf" template = templateEnv....
17
25.82
88
9
113
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_267d9409ff7a4682_99a72d62", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ null ]
[ 15 ]
[ 56 ]
2024-11-18T22:11:37.809793+00:00
1,488,776,568,000
e15313eaf096fca692f9a3cae34489a17d47ce85
2
{ "blob_id": "e15313eaf096fca692f9a3cae34489a17d47ce85", "branch_name": "refs/heads/master", "committer_date": 1488776568000, "content_id": "5f0ce62d4753c5763ec1375a10319f9afcb6963c", "detected_licenses": [ "MIT" ], "directory_id": "65e351098b00365664545dd461543382df1ed624", "extension": "py", "fi...
2.421875
stackv2
from flask import request, jsonify from functools import wraps from voluptuous import Any, Schema, Required, Optional, MultipleInvalid, Invalid sample_schema = Schema({ Required('id'): int, }) def validate_json(f): @wraps(f) def wrapper(*args, **kw): try: request.json except E...
32
24.94
80
20
188
python
[{"finding_id": "codeql_py/stack-trace-exposure_141fefc2f57dc691_7890b463", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 29 ]
[ null ]
[ 32 ]
[ 49 ]
2024-11-18T22:24:02.596262+00:00
1,584,362,848,000
d40b3321dd46c4e7b6cf2748fc87c78a8ca27d82
2
{ "blob_id": "d40b3321dd46c4e7b6cf2748fc87c78a8ca27d82", "branch_name": "refs/heads/master", "committer_date": 1584362848000, "content_id": "846aca1278e2bb3f9ea135b64a52018a1b7fdd21", "detected_licenses": [ "MIT" ], "directory_id": "3aee8e0a28080b7e2098ce02737ea06e6963dfa5", "extension": "py", "fi...
2.390625
stackv2
import oyaml as yaml from pathlib import Path from jsonpath_ng import parse from jinja2 import Template from . import template, exceptions class FileLoader: file_types = ["*.yaml", "*.yml"] def __init__(self, file_path): self.file_path = file_path def load_raw_data(self): files = [] ...
133
30.12
98
19
929
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f0341fdcaa4b2e39_8508df37", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 53 ]
[ null ]
[ 16 ]
[ 40 ]
2024-11-18T22:24:21.139780+00:00
1,436,426,683,000
bedd73debcf94e68afeca7711776e089855d4c34
2
{ "blob_id": "bedd73debcf94e68afeca7711776e089855d4c34", "branch_name": "refs/heads/master", "committer_date": 1436426683000, "content_id": "5292781a3656ece5f62dbd4a9bb5e1b47b3e7f8c", "detected_licenses": [ "MIT" ], "directory_id": "c2d1a7df02977119e4feb82a8d625275b9089c7a", "extension": "py", "fi...
2.453125
stackv2
from contextlib import contextmanager from cryptography.fernet import Fernet from getpass import getpass from hashlib import sha512 from inspect import signature import pickle import sqlite3 from bottle import redirect, abort, request, response class InvalidUserException(Exception): def __init__(self): s...
385
32.98
117
17
2,771
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6af3433d59a08097_21f8d63c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 18 ]
[ null ]
[ 19 ]
[ 66 ]
2024-11-18T22:36:04.148619+00:00
1,502,568,572,000
36ed280f9eaa78f62da86d049cff2e1f93e12828
3
{ "blob_id": "36ed280f9eaa78f62da86d049cff2e1f93e12828", "branch_name": "refs/heads/master", "committer_date": 1502568572000, "content_id": "bfa425aceca4f3ccf598736bf7f1360f25088070", "detected_licenses": [ "MIT" ], "directory_id": "9608f41ba6eb30fdae5c93d3265d280b4901046d", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python3 from flask import Flask from flask import request from flask import session from flask import make_response from flask import redirect from flask import abort print('Starting flask app named {}'.format(__name__)) app = Flask(__name__) @app.route('/') def index(): response = ''' <html> ...
89
18.21
66
10
461
python
[{"finding_id": "codeql_py/reflective-xss_57a00dc710a07e53_6e16900b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 34, 65 ]
[ null, null ]
[ 30, 12 ]
[ 38, 20 ]
2024-11-18T22:36:34.275746+00:00
1,630,193,894,000
73bc6d4f211b613fcacea4fda9dda85a28aa1365
3
{ "blob_id": "73bc6d4f211b613fcacea4fda9dda85a28aa1365", "branch_name": "refs/heads/main", "committer_date": 1630193894000, "content_id": "390f454e0a63727389954d2c12f2d11c3a34ed9e", "detected_licenses": [ "MIT" ], "directory_id": "49a8de5d915edad5c750fa1262d9c26f0ad52078", "extension": "py", "file...
2.859375
stackv2
import re, requests, json, subprocess, os, ffmpeg from pytube import YouTube class YTToMP3: def __init__(self, limit_size=None): self.limit_size = limit_size self.newfiles = [] self.error_message = "" ''' Downloads and converts to MP3 a video from YouTube ''' def downlo...
107
27.98
127
14
696
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_c03a7cc2d513ee42_5b75da52", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before '(www.youtube|youtube).com/', so it ...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before '(www.youtube|youtube).com/', so it might match more hosts than expected." ]
[ 64 ]
[ null ]
[ 19 ]
[ 65 ]
2024-11-18T20:23:13.801281+00:00
1,534,606,762,000
90adb677851b507b15e244a2cc7ef6b34dacf3b6
2
{ "blob_id": "90adb677851b507b15e244a2cc7ef6b34dacf3b6", "branch_name": "refs/heads/master", "committer_date": 1593772977000, "content_id": "7a40bcde6bef099867bbd9c0df1f0c302049198e", "detected_licenses": [ "MIT" ], "directory_id": "fb205cacd4dff57e2e8d4eb0119d48dd82fc3600", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python """Usage: tvnplayer [-o FILE | -p COMMAND] [--debug] [URL] -h --help Show this help -o --output FILE Write stream to FILE; if - is used as FILE, stream will be written to standard output -p --player COMMAND Pass stream URL to player --debug ...
188
26.94
78
15
1,216
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_1f1c53af86969a58_fe900b1c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://tvnplayer.pl](1) may be at an arbitrary positio...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [http://tvnplayer.pl](1) may be at an arbitrary position in the sanitized URL." ]
[ 152 ]
[ null ]
[ 8 ]
[ 52 ]
2024-11-18T20:23:15.489495+00:00
1,592,353,250,000
87725dcff9f5fe8520aebb3dc204263e12f93e80
2
{ "blob_id": "87725dcff9f5fe8520aebb3dc204263e12f93e80", "branch_name": "refs/heads/master", "committer_date": 1592353250000, "content_id": "4a71a2360b2f3e90b4a2e31a98b3a07a489cada8", "detected_licenses": [ "MIT" ], "directory_id": "eefb87d222df22f7810f0dbc374350bdfb88ae09", "extension": "py", "fi...
2.46875
stackv2
import asyncio import aiohttp import newrelic.agent import logging import sys from config import get_config logger = logging.getLogger() logger.setLevel(logging.INFO) handler = logging.StreamHandler(sys.stdout) handler.setLevel(logging.INFO) logger.addHandler(handler) def send_summary_event(app, stats): newreli...
92
33.68
97
15
665
python
[{"finding_id": "codeql_py/request-without-cert-validation_81c59ffdd730fafe_187d2f20", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 26 ]
[ null ]
[ 16 ]
[ 70 ]
2024-11-18T20:23:27.335374+00:00
1,445,379,883,000
9851d4690478a42849da9b93eda78ca1fb9882d1
3
{ "blob_id": "9851d4690478a42849da9b93eda78ca1fb9882d1", "branch_name": "refs/heads/master", "committer_date": 1445379883000, "content_id": "6e714ac83db064ee9023bd13ef04ab52fdc8c3c7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fd40bd3288927d9dcce742e225fad77cbaa46116", "extension": "py"...
2.5625
stackv2
# -*- coding: utf-8 -*- import requests from colorama import Fore LAST_FM_API_ROOT = "http://ws.audioscrobbler.com/2.0/" LAST_FM_LOVED_TRACKS = LAST_FM_API_ROOT + "?method=user.getLovedTracks" \ "&api_key=%s" \ "&limit=%d" \ ...
57
29.42
105
13
409
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ee05016ae6114384_fc451148", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 24 ]
[ null ]
[ 15 ]
[ 50 ]
2024-11-18T20:23:28.476817+00:00
1,602,864,476,000
4a45106f510aa3bed819b152f9b2742dddfadcb2
2
{ "blob_id": "4a45106f510aa3bed819b152f9b2742dddfadcb2", "branch_name": "refs/heads/master", "committer_date": 1602864476000, "content_id": "a8b8b2d823b60b910487ac6a4ed76164bef67c6f", "detected_licenses": [ "MIT" ], "directory_id": "35a0b95f5a13f2cf3ae92d554a65fac00262b5db", "extension": "py", "fi...
2.421875
stackv2
import random import re from userbot import bot from asyncio import sleep from userbot.events import register EMOJI_PATTERN = re.compile( "[" "\U0001F1E0-\U0001F1FF" # flags (iOS) "\U0001F300-\U0001F5FF" # symbols & pictographs "\U0001F600-\U0001F64F" # emoticons "\U0001F680-\U0001F6FF" # trans...
147
21.12
98
16
1,096
python
[{"finding_id": "codeql_py/overly-large-range_a1588c3fd3c8fbef_a611deac", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
9
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 9, 9, 9, 9, 9, 9, 9, 10, 10 ]
[ null, null, null, null, null, null, null, null, null ]
[ 6, 9, 12, 15, 18, 21, 24, 6, 9 ]
[ 10, 13, 16, 19, 22, 25, 28, 10, 13 ]
2024-11-18T20:23:32.457453+00:00
1,620,232,995,000
1abbb95d46686be78646b3cb0fc37a5fa61d1b45
3
{ "blob_id": "1abbb95d46686be78646b3cb0fc37a5fa61d1b45", "branch_name": "refs/heads/master", "committer_date": 1620232995000, "content_id": "30b98f4b18ce1eadcdd7aa9772f32b0976442d47", "detected_licenses": [ "MIT" ], "directory_id": "205e940e19e22bdf6d18fdb2a8d24f2fc646fabb", "extension": "py", "fi...
2.890625
stackv2
"""A url shortener flask app""" import re import os import string import random import hashlib import datetime import gunicorn from urllib.parse import unquote from pymongo import MongoClient from flask import render_template from flask import Flask,redirect,request app = Flask('app') client = MongoClient("replace_yo...
96
26.8
116
13
699
python
[{"finding_id": "codeql_py/overly-large-range_68cefeb2397f1dc7_f88b4666", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
2
true
[ "CWE-020", "CWE-215" ]
[ "py/overly-large-range", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 21, 92 ]
[ null, null ]
[ 54, 5 ]
[ 57, 24 ]
2024-11-18T20:23:32.520700+00:00
1,331,484,556,000
3b9376b6e876284e9018d919d933195e8b8d6582
3
{ "blob_id": "3b9376b6e876284e9018d919d933195e8b8d6582", "branch_name": "refs/heads/master", "committer_date": 1331484556000, "content_id": "2a05fbbfde43f91caf72f1b75a141de71ab1be20", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1c6c022bea08430db4d66de6cb57f7218a97be30", "extension": "py"...
2.640625
stackv2
#!/usr/bin/env python # # Communicates with the arduino and responds to changes in Office # Communicator. You can pass in an optional port, default is 8123. # # Examples: # # server.py # port 8123 # server.py 8181 # port 8181 # import BaseHTTPServer import urlparse import urllib import string import cgi impo...
103
26.95
69
17
669
python
[{"finding_id": "codeql_py/path-injection_345deb88c2d0c7a7_db322c6e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 74, 75 ]
[ null, null ]
[ 35, 30 ]
[ 40, 35 ]
2024-11-18T20:23:41.007241+00:00
1,543,144,419,000
64b1877ab958643168f564c40b1a7c5cc9666b3d
3
{ "blob_id": "64b1877ab958643168f564c40b1a7c5cc9666b3d", "branch_name": "refs/heads/master", "committer_date": 1543144419000, "content_id": "a9d399f88c6386e0b119af5ed615be17641b216a", "detected_licenses": [ "MIT" ], "directory_id": "4a28f2e0184b69d51493c431c3ebb65fee1fa333", "extension": "py", "fi...
2.6875
stackv2
from flask import Flask, jsonify, request import requests import hashlib import json import sys import os import io import logging import redis import ast import configparser # START APP app = Flask(__name__) # CONFIGURATION FILE config = configparser.ConfigParser() config.read('/data/config.ini') # CONFIGURATION PR...
67
25.07
86
15
469
python
[{"finding_id": "codeql_py/flask-debug_9e0cf78c42c3f47c_dfcd9bf5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-295", "CWE-918" ]
[ "py/flask-debug", "py/request-without-cert-validation", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This request may run without certificate validation because [it is disabled](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 65, 50, 50 ]
[ null, null, null ]
[ 2, 10, 10 ]
[ 54, 87, 87 ]
2024-11-18T21:22:30.824539+00:00
1,493,496,314,000
ff67be6778408540c58101a8875115b45f831798
2
{ "blob_id": "ff67be6778408540c58101a8875115b45f831798", "branch_name": "refs/heads/master", "committer_date": 1493496314000, "content_id": "4a53a03f3b7fba55077537cdb4f63213feacff9b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "51781ae6f344ddb3a76b2e06b6dc6620f96fb069", "extension": "py"...
2.40625
stackv2
import click import configparser import os from .api import * @click.group() @click.option('--credentials', help='Path to credentials file', default='~/.spark-oktawave-credentials') @click.pass_context def cli(ctx, credentials): ctx.obj['config'] = configparser.RawConfigParser() ctx.obj['config'].read(os.path....
90
36.24
104
18
800
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71de7297150c7912_f8d97251", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 68 ]
[ null ]
[ 11 ]
[ 58 ]
2024-11-18T21:51:09.013818+00:00
1,579,065,740,000
cd42ce2c8376f2a006e11cd62b588825444f0af0
3
{ "blob_id": "cd42ce2c8376f2a006e11cd62b588825444f0af0", "branch_name": "refs/heads/master", "committer_date": 1579065740000, "content_id": "94df64417f32cfc8c8aca022cbb57881ba92dbd0", "detected_licenses": [ "MIT" ], "directory_id": "4fdec7ebfd1aac9ad283982c87686591994e3d26", "extension": "py", "fi...
2.96875
stackv2
import unittest import pandas as pd import random import numpy as np def read_data(filename="../data/zipcode.csv.gz"): df = pd.read_csv(filename,index_col="zip") df.index = df.index.map(str) # df.index.astype('str', copy=False) # df['latitude'] = pd.to_numeric(df['latitude']) # df['longitude'] = pd...
108
37.1
110
19
1,142
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6220b510fa7243c1_adc6a266", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
7
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 88, 88, 88, 88, 99, 99, 99 ]
[ null, null, null, null, null, null, null ]
[ 27, 30, 43, 57, 27, 30, 38 ]
[ 28, 41, 55, 64, 28, 36, 45 ]
2024-11-18T21:51:29.753810+00:00
1,554,064,173,000
0221d3e1b8b3bde5e227587f7510b35ed26e144c
4
{ "blob_id": "0221d3e1b8b3bde5e227587f7510b35ed26e144c", "branch_name": "refs/heads/master", "committer_date": 1554064173000, "content_id": "82677f393d756f2306f58677b893eb673a4e89c1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "442aab7993bc275cbd48ce9c110d5c449ba70d4a", "extension": "py"...
3.765625
stackv2
import random secret = random.randint(1,99) print("Guess Secret number:", secret) past_guesses ={} guess = -1 while guess != secret: guess = int(input("make a guess:")) if guess in past_guesses: past_guesses[guess]==1 print("You guessed that", past_guesses[guess], 'times') else: pas...
19
26.16
63
14
128
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7f078639c6fc1b7c_9c7b2e11", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 3 ]
[ null ]
[ 31 ]
[ 37 ]
2024-11-18T21:51:34.281188+00:00
1,609,852,025,000
fa2ba25f3aa298b28ebe67e1bdc1c73cf8e43aa7
2
{ "blob_id": "fa2ba25f3aa298b28ebe67e1bdc1c73cf8e43aa7", "branch_name": "refs/heads/main", "committer_date": 1609852025000, "content_id": "cb16371f4631bf7e2b02e4bd247c638e2b8a21bb", "detected_licenses": [ "MIT" ], "directory_id": "430ad6a1a5ba1b847d0e314fe662c38ef34f3849", "extension": "py", "file...
2.421875
stackv2
import requests import re import os import time requests.packages.urllib3.disable_warnings() headers = {'Connection': 'close', 'Cache-Control': 'max-age=0', 'Upgrade-Insecure-Requests': '1', 'User-Agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_3) AppleWebKit/537.36 (KHTML, like ...
71
29.65
114
15
642
python
[{"finding_id": "codeql_py/request-without-cert-validation_04050f6cc648b22b_09b3a483", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 56 ]
[ null ]
[ 23 ]
[ 89 ]
2024-11-18T21:51:35.603898+00:00
1,536,970,479,000
43fb078d9e870d22446130203b9920d2e5e35d78
3
{ "blob_id": "43fb078d9e870d22446130203b9920d2e5e35d78", "branch_name": "refs/heads/master", "committer_date": 1536970479000, "content_id": "b8f0c08108f9c928271943655db5079ecdb4f340", "detected_licenses": [ "MIT" ], "directory_id": "68aa8a68bfa5a8624af166aef8d61648666e1988", "extension": "py", "fi...
2.546875
stackv2
import traceback import pickle import json from tornado.web import RequestHandler from tornado.web import authenticated from tornado.gen import coroutine import sys class SuperController(RequestHandler): """Utilice esta clase para factorizar metodos comunes de entre los controladores.""" def get_user(self):...
77
30.35
101
14
483
python
[{"finding_id": "codeql_py/stack-trace-exposure_4b6cdfdda34faf2a_05ebd123", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 41, 60 ]
[ null, null ]
[ 20, 20 ]
[ 94, 46 ]
2024-11-18T21:51:41.415623+00:00
1,594,056,299,000
f8a308fe0e564a167f59342c13caa9d2080a0c0e
2
{ "blob_id": "f8a308fe0e564a167f59342c13caa9d2080a0c0e", "branch_name": "refs/heads/master", "committer_date": 1594056299000, "content_id": "f223b009357f219b651b8f4f164f51bf72d21bfd", "detected_licenses": [ "MIT" ], "directory_id": "89f4a8bd73f28ef661575bb124fa9b56de7bb241", "extension": "py", "fi...
2.46875
stackv2
import os import subprocess from flask import Flask, request, redirect, url_for, send_from_directory, after_this_request from werkzeug.utils import secure_filename UPLOAD_FOLDER = '/tmp/uploads/' ALLOWED_EXTENSIONS = set(['png', 'jpg', 'jpeg']) app = Flask(__name__) app.config['UPLOAD_FOLDER'] = UPLOAD_FOLDER app.con...
84
39.98
173
16
798
python
[{"finding_id": "codeql_py/url-redirection_267b701271e35cfb_0de48612", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 38, 44 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-18T21:52:08.780827+00:00
1,690,045,444,000
b0433417c2b2499efbaccea5a8bd9245aca1bc51
3
{ "blob_id": "b0433417c2b2499efbaccea5a8bd9245aca1bc51", "branch_name": "refs/heads/master", "committer_date": 1690045444000, "content_id": "bbcbf2fc8e320a8a970eb7b221a93f618ba22bc8", "detected_licenses": [ "Unlicense" ], "directory_id": "f0ef841cd2121cd92947d1df5993693a73e5940f", "extension": "py",...
3.25
stackv2
""" Implementation of the Yubico OTP algorithm. This can generate and parse OTP structures. >>> from binascii import unhexlify >>> key = b'0123456789abcdef' >>> otp = OTP(unhexlify(b'0123456789ab'), 5, 0x0153f8, 0, 0x1234) >>> _ = repr(otp) # coverage >>> _ = str(otp) # coverage >>> token = encode_otp(otp, key, b'cc...
239
28.47
113
13
1,832
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_efc15f5fa2505702_7e299179", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 63, 93 ]
[ null, null ]
[ 11, 11 ]
[ 50, 50 ]
2024-11-18T21:52:10.297800+00:00
1,610,407,053,000
5b2cc1fd460ed4fe5f8c9c6508d1c2375c3b40b5
2
{ "blob_id": "5b2cc1fd460ed4fe5f8c9c6508d1c2375c3b40b5", "branch_name": "refs/heads/master", "committer_date": 1610407053000, "content_id": "2644dc08b28bd82eca4bcbf23ac0e29f70a74606", "detected_licenses": [ "MIT" ], "directory_id": "71324aca11e16d6da17b0440e72d0107f5af6e04", "extension": "py", "fi...
2.359375
stackv2
import json from abc import abstractmethod from django.contrib.auth import authenticate, login from django.shortcuts import render from django.http import QueryDict from rest_framework.views import APIView as _APIView from rest_framework.response import Response from .serializers import UserLoginSerializer class C...
104
28.97
80
17
605
python
[{"finding_id": "codeql_py/stack-trace-exposure_abb937d9ddd5a3ed_7aa1d748", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user." ]
[ 50 ]
[ null ]
[ 25 ]
[ 29 ]
2024-11-18T22:28:15.450147+00:00
1,583,310,809,000
99150f2948a3ecaf8baa3011171f1a4d8ec32303
2
{ "blob_id": "99150f2948a3ecaf8baa3011171f1a4d8ec32303", "branch_name": "refs/heads/master", "committer_date": 1583310809000, "content_id": "66ac05ec1bf7248c7c4fa1a47c1f91e1f79c3457", "detected_licenses": [ "MIT" ], "directory_id": "140d57227526e158c80d9b88082de37d7908a9f3", "extension": "py", "fi...
2.359375
stackv2
import random import shutil import string from pathlib import Path from flask import Flask, request, render_template, send_from_directory, jsonify DATASET_PATH = '/mnt/dataset/wabisabi/' MOVED_PATH = '/mnt/dataset/moved/' MOSAIC_PATH = '/mnt/dataset/mosaic/' app = Flask(__name__) def get_random_string(digit=8): ...
120
23.44
95
14
724
python
[{"finding_id": "codeql_py/flask-debug_ed5a441bd4cbec31_50afefea", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
9
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-pro...
[ 120, 29, 29, 39, 39, 33, 43, 94, 103 ]
[ null, null, null, null, null, null, null, null, null ]
[ 5, 25, 47, 25, 45, 29, 29, 21, 21 ]
[ 51, 45, 65, 43, 65, 46, 46, 36, 36 ]
2024-11-18T22:44:40.700632+00:00
1,530,799,317,000
d7a39163206f7cd49c0c19661748c29da64e1dab
3
{ "blob_id": "d7a39163206f7cd49c0c19661748c29da64e1dab", "branch_name": "refs/heads/master", "committer_date": 1530799317000, "content_id": "14e288049d5160d73213210c02bd3f68f2d97154", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "22741ae8cafcb6fa8fc1e409182a14ee4853e7d5", "extension": "p...
3.125
stackv2
from flask import Flask, request from sklearn import tree import json app = Flask(__name__) @app.route('/query-example') def query_example(): language = request.args.get('language') return '''<h1>The language value is {}</h1>'''.format(language) @app.route('/scikit-example', methods = ['POST','GET']) def skikit_ex...
107
29.11
102
17
1,087
python
[{"finding_id": "codeql_py/reflective-xss_5e9b73238e0b56db_db571fc2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 9, 23, 69, 89 ]
[ null, null, 70, 94 ]
[ 9, 14, 10, 9 ]
[ 65, 69, 73, 100 ]
2024-11-18T22:44:40.996776+00:00
1,620,164,757,000
03637819df7d7ed80d2ab22e654baa655f7dfa37
3
{ "blob_id": "03637819df7d7ed80d2ab22e654baa655f7dfa37", "branch_name": "refs/heads/master", "committer_date": 1620164757000, "content_id": "8fe1aca958455f3a01c740cb22c64ae5a87720a2", "detected_licenses": [ "MIT" ], "directory_id": "3651699f385eed05a1bb24b92c4ed5178f970551", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python3 import os import jinja2 import json import jsonschema from cidc_schemas.json_validation import ( load_and_validate_schema, _load_dont_validate_schema, ) from cidc_schemas.constants import SCHEMA_DIR DOCS_DIR = os.path.dirname(os.path.abspath(__file__)) ROOT_DIR = os.path.join(DOCS_DIR, "...
127
33.05
89
18
892
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4421d1f3f0697891_5b4ce7de", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 77 ]
[ null ]
[ 19 ]
[ 60 ]
2024-11-18T22:44:50.415872+00:00
1,609,313,540,000
888c4cc6363f6f015f76c80042ebbb5685808ac9
2
{ "blob_id": "888c4cc6363f6f015f76c80042ebbb5685808ac9", "branch_name": "refs/heads/main", "committer_date": 1609313540000, "content_id": "155332c69d97f07053a770207335cd4a2599546f", "detected_licenses": [ "MIT" ], "directory_id": "018eb1dbf449a06e2516740a0799b1fdba8d1a9e", "extension": "py", "file...
2.4375
stackv2
from rest_framework import status from rest_framework.response import Response from rest_framework.views import APIView from train_data.services.services import service_result import traceback class PredictTillDate(APIView): @staticmethod def post(request): try: # file_storage_utility.crea...
33
40.45
119
18
257
python
[{"finding_id": "codeql_py/stack-trace-exposure_02cf8fe5fa8f7dd1_93fd77a9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 33 ]
[ null ]
[ 29 ]
[ 69 ]
2024-11-18T21:00:02.307873+00:00
1,601,832,800,000
534e3cfa69df7d864af505b5d91e3dbc6e0a4f42
2
{ "blob_id": "534e3cfa69df7d864af505b5d91e3dbc6e0a4f42", "branch_name": "refs/heads/master", "committer_date": 1601832800000, "content_id": "063d83c067f1f4fc24572bd478976958aad493e8", "detected_licenses": [ "MIT" ], "directory_id": "19ffebe7bdd3cf3bac532029a2602e0eb4d6a576", "extension": "py", "fi...
2.390625
stackv2
import sys if sys.version_info.major == 2: from warnings import filterwarnings filterwarnings("ignore", module=".*paramiko.*") from paramiko import SSHClient, AutoAddPolicy from .abstractshell import AbstractShell from .abstractremoteshell import AbstractRemoteShell from .shellresult import ShellResult from .q...
62
38.44
120
16
560
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5b4312a0eea90214_a8ba4c2c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 32 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-18T21:00:28.555723+00:00
1,609,415,291,000
7f492bf451476974c0c41450d84162b7e27bbcf0
3
{ "blob_id": "7f492bf451476974c0c41450d84162b7e27bbcf0", "branch_name": "refs/heads/master", "committer_date": 1609415291000, "content_id": "d28eb850049b634f50b99d8cd9665560679f0b7c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bd6201cb3b1fc8973dae628998c9cf3b7b97c06b", "extension": "py"...
3.125
stackv2
#!/usr/bin/env python3 """ module for yaml functions """ import yaml from pprint import pprint def load_yaml(file_yaml): with open(file_yaml, 'r') as f: handle_yaml = yaml.safe_load(f) return handle_yaml def print_output(output): print("*" * 24) print("Map of learned MAC addresses") ...
38
27
86
16
295
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2d1e2c192deac2fd_7ac35b48", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 23 ]
[ null ]
[ 15 ]
[ 73 ]
2024-11-18T21:01:07.404920+00:00
1,499,115,609,000
2a82dcf59cc67c2c41ce4840b0b87222eaa196fa
2
{ "blob_id": "2a82dcf59cc67c2c41ce4840b0b87222eaa196fa", "branch_name": "refs/heads/master", "committer_date": 1499115609000, "content_id": "3233d6c742e41033c2ad8f06a472cb5d4895a753", "detected_licenses": [ "MIT" ], "directory_id": "605ec13aa1e2c5f11b0c87a6f003c2c3794cfb96", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, request, redirect, jsonify, url_for, flash from sqlalchemy import create_engine from sqlalchemy.orm import sessionmaker from models import Base, Category, Item, User from flask import session as login_session import random import string import oath_logins.google as google import oath_logins.fac...
262
34.14
79
19
1,892
python
[{"finding_id": "codeql_py/url-redirection_2fb7fd0eb547a3b6_1d7e6e4a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 190 ]
[ null ]
[ 29 ]
[ 54 ]
2024-11-18T21:01:32.888606+00:00
1,523,134,364,000
240d533a9506261cde90950d842c5376d79a85f1
3
{ "blob_id": "240d533a9506261cde90950d842c5376d79a85f1", "branch_name": "refs/heads/master", "committer_date": 1523134364000, "content_id": "663ef02fd29fe32d0056edb4eafbe50cd244b7cc", "detected_licenses": [ "MIT" ], "directory_id": "4f50579b9cc51f9f80ab7f6f771c1321d2be8fa0", "extension": "py", "fi...
2.984375
stackv2
from Crypto import Random from Crypto.Cipher import AES from Crypto.Hash import SHA256 from Crypto.Util import Padding def encrypt_file(input_path, output_path, password, chunk_size=4096): cipher = AESCipher(password, chunk_size) inp = open(input_path, "rb") out = open(output_path, "wb") data = inp.rea...
73
34.7
77
15
627
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7ea0cb806822a349_5ce4ae75", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 35 ]
[ null ]
[ 31 ]
[ 55 ]
2024-11-18T21:25:35.344660+00:00
1,541,759,793,000
2d70e776d281097dad32a69e247fb7bba78026ac
3
{ "blob_id": "2d70e776d281097dad32a69e247fb7bba78026ac", "branch_name": "refs/heads/master", "committer_date": 1541759793000, "content_id": "f61eaf46c7fbd5d5c4d73b199fd14ea326084647", "detected_licenses": [ "MIT" ], "directory_id": "59a4745867d194a4ecfc6bee5a8f034d9c13aec9", "extension": "py", "fi...
2.859375
stackv2
"""Storage and version control helper methods.""" import os import time import shutil import hashlib import tarfile import tensorflow as tf from git import Repo def git_revision_hash(): """Return the git revision id/hash. Returns: str: Git revision hash. """ repo = Repo('.', search_parent_di...
165
25.28
100
17
957
python
[{"finding_id": "codeql_py/tarslip_0ac7a3417460dcf9_46803330", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 160, 163 ]
[ null, null ]
[ 29, 29 ]
[ 30, 30 ]
2024-11-18T22:00:16.296231+00:00
1,572,528,895,000
f6d2fea9bc4dedc8918ea0ea48bf96da9c4c6996
3
{ "blob_id": "f6d2fea9bc4dedc8918ea0ea48bf96da9c4c6996", "branch_name": "refs/heads/master", "committer_date": 1572528895000, "content_id": "89bc834d7139dd8654fad53259a49710b2a02c61", "detected_licenses": [ "MIT" ], "directory_id": "f4789abb93c804e6431f9e80f20427d04f54a81f", "extension": "py", "fi...
2.5625
stackv2
"""Implements login function and links users to measurement""" from flask import Blueprint, flash, render_template, redirect, url_for, request, abort, send_file, session from sqlalchemy.exc import IntegrityError from flask_login import LoginManager, login_user, logout_user, UserMixin, current_user from ..db import db, ...
223
34.13
121
20
1,751
python
[{"finding_id": "codeql_py/url-redirection_bc5c9f6f4c2a6ff2_dd274db4", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 91, 104 ]
[ null, null ]
[ 25, 33 ]
[ 53, 61 ]
2024-11-18T22:00:17.504135+00:00
1,473,605,065,000
6779a47a2746f92d6ef6c18658988142ce4f8ec7
3
{ "blob_id": "6779a47a2746f92d6ef6c18658988142ce4f8ec7", "branch_name": "refs/heads/master", "committer_date": 1473605065000, "content_id": "52e84ffa73e0e954df6ccfa6782b969861d00871", "detected_licenses": [ "MIT" ], "directory_id": "c2a6adcfb2319b67922c646ebfb70a8f189c5e12", "extension": "py", "fi...
2.578125
stackv2
from __future__ import unicode_literals from __future__ import print_function from __future__ import absolute_import from fs.errors import FSError from .console import Cell from .compat import text_type, implements_to_string from .reader import DataReader import weakref import re _re_fs_path = re.compile(r'^(?:\{(.*...
110
25.09
65
18
634
python
[{"finding_id": "codeql_py/redos_2b7ac3784038efc4_e2005c22", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '{{' and containing many repetitions of '}}{{'." ]
[ 13 ]
[ null ]
[ 35 ]
[ 38 ]