added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T01:26:10.162693+00:00
1,500,900,157,000
270bc355fedc95938eec03b6c2a031423e4609fc
3
{ "blob_id": "270bc355fedc95938eec03b6c2a031423e4609fc", "branch_name": "refs/heads/master", "committer_date": 1500900157000, "content_id": "eae39620d98036db4518756b3cadcd7bb2a7ba2f", "detected_licenses": [ "MIT" ], "directory_id": "a7cd37781c6e8aa85e02d1a1148a0fed7b6f7e5e", "extension": "py", "fi...
2.625
stackv2
from __future__ import print_function import matplotlib.pyplot as plt import numpy as np import os import sys import tensorflow as tf import tarfile from IPython.display import display, Image from scipy import ndimage from sklearn.linear_model import LogisticRegression from six.moves.urllib.request import urlretrieve f...
244
37.52
102
18
2,507
python
[{"finding_id": "codeql_py/tarslip_1548a07e239d9a98_3084accf", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 43 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T01:51:51.679640+00:00
1,521,555,169,000
a3a3069e8600778fb14e921fe27efb6b1ef6d1d5
2
{ "blob_id": "a3a3069e8600778fb14e921fe27efb6b1ef6d1d5", "branch_name": "refs/heads/master", "committer_date": 1521555169000, "content_id": "d62e39ad1e86f71e1b31cc34e177f39925fa2619", "detected_licenses": [ "Apache-2.0" ], "directory_id": "45f5fb6063f2991e3f49b2b8e5f623420ed38adf", "extension": "py"...
2.3125
stackv2
# Copyright 2018 Pedro Cuadra - pjcuadra@gmail.com # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or a...
250
28.16
74
17
1,722
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6162fe5829875252_d5773439", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 233 ]
[ 238 ]
[ 11 ]
[ 6 ]
2024-11-19T01:52:01.262682+00:00
1,619,530,383,000
637117c5b9058aa2ea8a768dbff41a2edb37de06
2
{ "blob_id": "637117c5b9058aa2ea8a768dbff41a2edb37de06", "branch_name": "refs/heads/master", "committer_date": 1619530383000, "content_id": "e4065a2eb63a9cd2cf9b3d0f2fba5623b74e74f3", "detected_licenses": [ "CC0-1.0" ], "directory_id": "e859db4db6030c90454e9b43f0ab6bdf7247d6b3", "extension": "py", ...
2.3125
stackv2
from flask import Flask, render_template, jsonify, request from importlib import import_module from flask_cors import CORS app = Flask(__name__,static_folder='downloads') CORS(app) @app.route('/', methods=['GET', 'POST']) def index(): return render_template('index.html') @app.route('/translate', methods=['POST']...
54
39.07
83
16
527
python
[{"finding_id": "codeql_py/flask-debug_fd6f876973b4f360_476c7819", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 54, 49 ]
[ null, null ]
[ 5, 15 ]
[ 24, 57 ]
2024-11-19T00:55:26.075518+00:00
1,635,164,994,000
161e44b47b5724d1c4c90084517b06f6901c880b
3
{ "blob_id": "161e44b47b5724d1c4c90084517b06f6901c880b", "branch_name": "refs/heads/main", "committer_date": 1635164994000, "content_id": "4baecc27f6715b8c884e6567113abd6cdb53b2eb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7e92dc0e8980c2b7233b3905fdfd993d13de903b", "extension": "py", ...
3.046875
stackv2
import requests from bs4 import BeautifulSoup as bs import re text = requests.get('https://gnu.org').text def strip_tags(html): soup = bs(html, 'html.parser') strip = soup.get_text() return strip def remove_puncs(text): remove_punc3 = r"[^A-z0-9 ]+" text = re.sub(remove_punc3, ' ', text) text = re.sub(r'[\s]+'...
18
20.39
43
9
113
python
[{"finding_id": "codeql_py/overly-large-range_dfd0a66408c19d5c_be6815ca", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 13 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-19T01:40:02.390869+00:00
1,517,203,494,000
fd30159ce823a3e25463e61f00f44bbd67a493ea
3
{ "blob_id": "fd30159ce823a3e25463e61f00f44bbd67a493ea", "branch_name": "refs/heads/master", "committer_date": 1517203494000, "content_id": "fdd21e0b383dbb011edaf4eca47043bcdb809b89", "detected_licenses": [ "MIT" ], "directory_id": "7c435e57540e9ac6382f2d9d77c1fa17e989de26", "extension": "py", "fi...
2.796875
stackv2
""" The REST api server for the coderunner @author eLIPSE """ from json import dumps from os import environ from typing import Dict from flask import Flask, request from codesandbox.sandbox import run_code, run_gui_code # Load environment variables import codesandbox.settings API_KEY = environ.get("API_KEY") app =...
75
21.84
69
14
404
python
[{"finding_id": "codeql_py/stack-trace-exposure_3a7b2be5bedc6ab7_f1e156b2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 63 ]
[ null ]
[ 16 ]
[ 51 ]
2024-11-18T23:43:34.528695+00:00
1,606,811,570,000
60d0122dd1bd8a773ef5658a56dca0f79a1cf117
2
{ "blob_id": "60d0122dd1bd8a773ef5658a56dca0f79a1cf117", "branch_name": "refs/heads/master", "committer_date": 1606811570000, "content_id": "4c66445d99470255f3d69089524dd996beb896b3", "detected_licenses": [ "MIT" ], "directory_id": "be496d11a15cfcdc52a1d9e9a2d6a0a81756c612", "extension": "py", "fi...
2.328125
stackv2
from pyqrcode import QRCode import io from django.http import HttpResponse from django.utils.datastructures import MultiValueDictKeyError from rest_framework.decorators import api_view from rest_framework.response import Response from rest_framework import status, generics, permissions from PIL import Image, ImageDraw,...
101
34.96
101
16
863
python
[{"finding_id": "codeql_py/stack-trace-exposure_0ee7ca5d81380d2f_723f8f83", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 63 ]
[ null ]
[ 25 ]
[ 54 ]
2024-11-19T00:33:01.177866+00:00
1,692,327,102,000
5516cfd67e3142e4000d6c707c4575fe42b46698
2
{ "blob_id": "5516cfd67e3142e4000d6c707c4575fe42b46698", "branch_name": "refs/heads/master", "committer_date": 1692327102000, "content_id": "e223823fead2f0b3551f92d4cc2b9dd095055713", "detected_licenses": [ "MIT" ], "directory_id": "f54127042008716625281af36d272afbd1d68754", "extension": "py", "fi...
2.46875
stackv2
""" Welcome to the app! This extremely un-Pythonic __init__.py file sets up our primary Flask object for use by the other elements of the API. Keep in mind that order of imports is critical here, since Flask is subject to so-called circular imports/mutual import references. """ # standard librar...
169
29.16
80
15
1,123
python
[{"finding_id": "codeql_py/reflective-xss_7ff7cddbb750f93f_d6ae54c7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)." ]
[ 120 ]
[ null ]
[ 20 ]
[ 68 ]
2024-11-19T01:18:04.264484+00:00
1,631,126,026,000
7ee4870a85edd28af6815ed1ab798a46e637d676
3
{ "blob_id": "7ee4870a85edd28af6815ed1ab798a46e637d676", "branch_name": "refs/heads/master", "committer_date": 1631126026000, "content_id": "06b4886081e59971ec4681a4a30bad07b7908dbf", "detected_licenses": [ "MIT", "CC0-1.0" ], "directory_id": "251f5c092d4b7760cec8c2b6324e5290b917721f", "extensio...
2.6875
stackv2
# -*- coding: utf-8 -*- import re import scrapy from locations.items import GeojsonPointItem from locations.hours import OpeningHours OPEN_STREET_MAP_OPENING_HOURS_SINGLE_DAY_REGEX = r'([a-zA-Z,]+)\s([\d:]+)-([\d:]+)' STORES_REGEX = r'https://stores.footlocker.com/.+/.+/.+/.+.html' class FootLockerSpider(scrapy.Sp...
96
40.51
119
16
868
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_efc30b7d223f3fde_f16b88d9", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'footlocker.com/', so it might match more hosts than expected." ]
[ 10 ]
[ null ]
[ 18 ]
[ 64 ]
2024-11-19T00:25:29.412239+00:00
1,540,966,306,000
a3f4f16857036dc768262d99ad3a6672f64ff0b8
2
{ "blob_id": "a3f4f16857036dc768262d99ad3a6672f64ff0b8", "branch_name": "refs/heads/master", "committer_date": 1540966306000, "content_id": "59fcd8e4dfae3b94acf75bca338580ac0a136b54", "detected_licenses": [ "MIT" ], "directory_id": "17445cb52e37ddd20db8edb98f0bf19af934b53b", "extension": "py", "fi...
2.40625
stackv2
# -*- coding: utf-8 -*- import jinja2 from distutils.dir_util import copy_tree t_loader = jinja2.FileSystemLoader(searchpath='templates/') t_env = jinja2.Environment(loader=t_loader) def publish(name, content): with open('release/' + name, 'wb') as f: f.write(content.encode('utf8')) def copy_statics()...
67
19.37
59
12
368
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_38b208c4bfa8c2fb_d01ad4db", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 7 ]
[ null ]
[ 9 ]
[ 44 ]
2024-11-19T00:28:40.704430+00:00
1,632,263,687,000
be950aa9862290095c048a000b2021a5857df229
3
{ "blob_id": "be950aa9862290095c048a000b2021a5857df229", "branch_name": "refs/heads/master", "committer_date": 1632263687000, "content_id": "8f47610da9e4a18421759137c79ce82ccdb87784", "detected_licenses": [ "MIT" ], "directory_id": "5418d1de3cf27af5112055d2c26a9686a7fb451e", "extension": "py", "fi...
2.546875
stackv2
import os import shutil import json import time import socket from config import Config def compilation_argv(source_path, binary_path, language): if language == 'cpp': return ['g++-9', source_path, '-o', binary_path, '-std=c++17', '-Wall', '-Wextra', '-O2'] elif language == 'java': return ['/...
160
38.64
107
18
1,370
python
[{"finding_id": "codeql_py/overly-permissive-file_a3248277c5312440_cb556847", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
3
true
[ "CWE-732", "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 46, 88, 94 ]
[ null, null, null ]
[ 13, 9, 9 ]
[ 43, 30, 30 ]
2024-11-19T00:50:17.852983+00:00
1,597,857,227,000
bb74dfce7c66cd1e5fe7f99de7a6c813edc8bad8
3
{ "blob_id": "bb74dfce7c66cd1e5fe7f99de7a6c813edc8bad8", "branch_name": "refs/heads/master", "committer_date": 1597857227000, "content_id": "850fec04565254215e030a32c64bb1d26779e98b", "detected_licenses": [ "MIT" ], "directory_id": "94aa56c66cc3933a20bec541f226f1976a352c4d", "extension": "py", "fi...
2.71875
stackv2
import os import argparse import glob import json import csv def main(path): graph = {} files=glob.glob(os.path.join(path, '**/manifest.json'), recursive=True) for json_file in files: folder = os.path.dirname(json_file) folder = folder.replace(path, '') try: manifest = j...
46
37.13
114
18
393
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_9fe783bb0d3f4673_aeb08671", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://raw.githubusercontent](1) may be at an arbitra...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://raw.githubusercontent](1) may be at an arbitrary position in the sanitized URL." ]
[ 20 ]
[ null ]
[ 16 ]
[ 59 ]
2024-11-19T00:51:35.627069+00:00
1,580,343,630,000
54c105c28ba8fe71b1cea92d292cfb8cd7750443
3
{ "blob_id": "54c105c28ba8fe71b1cea92d292cfb8cd7750443", "branch_name": "refs/heads/master", "committer_date": 1580343630000, "content_id": "b4dfe0f1fe50284f3082a7d5a7fd169860d59da8", "detected_licenses": [ "MIT" ], "directory_id": "0d9d88d592fbd92d04b775652f16b4fd74963002", "extension": "py", "fi...
3.171875
stackv2
import sys import json import math import geopy from geopy.distance import VincentyDistance from geopy.geocoders import Nominatim import openpyxl geolocator = Nominatim() def geo_reverse_print(lat, lon): print ("\n") print(str('%.6f' % lat) + "," + str('%.6f' % lon)) location = geolocator.reverse(str('%.6...
149
26.99
104
14
1,281
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_309455feede3a800_0e450945", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 95 ]
[ null ]
[ 16 ]
[ 38 ]
2024-11-19T01:30:50.074340+00:00
1,442,126,369,000
3f0f7cc65c64615d140d625c0eb08aa7f6a0e891
3
{ "blob_id": "3f0f7cc65c64615d140d625c0eb08aa7f6a0e891", "branch_name": "refs/heads/master", "committer_date": 1442126369000, "content_id": "ca370f28ce7c7be87861211accbad87f55c07718", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "223c9f393aa048c6193bc44fb60be06c214559f9", "ext...
2.5625
stackv2
import requests from bs4 import BeautifulSoup BASE = "http://rocketpun.ch/" get_soup = lambda url: BeautifulSoup(requests.get(url, verify=False).text) def main_task(Recruit, db_session): for recruit in get_list(): instance = Recruit.query.filter_by(id=recruit[3]).first() if instance: p...
43
31.51
85
16
315
python
[{"finding_id": "codeql_py/request-without-cert-validation_38b7b1f673e6bda9_3bce8f38", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 5 ]
[ null ]
[ 38 ]
[ 69 ]
2024-11-19T01:54:57.304491+00:00
1,549,979,592,000
c407b2bfbf18214b0805af993cbb63a88a60fca3
3
{ "blob_id": "c407b2bfbf18214b0805af993cbb63a88a60fca3", "branch_name": "refs/heads/master", "committer_date": 1549979592000, "content_id": "3372ab7dc7f0ed9990a960ec7f66e5d78b876a54", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0a3bf0a6f10eb143c9291090125946538ee73279", "extension": "py"...
2.765625
stackv2
import argparse import io import requests import pathlib import shutil import tempfile import tarfile EXPECTED_SIZE = 320807981 URL = "http://www.cs.columbia.edu/~kedzie/pubmed.tar.gz" CHUNK_SIZE = 32768 def main(): parser = argparse.ArgumentParser() parser.add_argument("--data-dir", type=pathlib.Path, requ...
48
27.54
71
15
323
python
[{"finding_id": "codeql_py/tarslip_836a488f412e1da3_53171a9b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 44 ]
[ null ]
[ 13 ]
[ 15 ]
2024-11-19T02:00:55.843583+00:00
1,594,900,108,000
ed7c9f1ef621515d29f073b9072179aa0b8d1e15
3
{ "blob_id": "ed7c9f1ef621515d29f073b9072179aa0b8d1e15", "branch_name": "refs/heads/master", "committer_date": 1594900108000, "content_id": "2c0969dd1e1941bb3c43f35f91194fea3546dcb9", "detected_licenses": [ "MIT" ], "directory_id": "da872e4e4d3bf0ff2acadd7ef5df778f52446c90", "extension": "py", "fi...
2.859375
stackv2
import os from datetime import datetime import click import requests IMAGE_FOLDER = os.path.join(os.path.expanduser('~/Pictures'), 'NASA') URL = 'https://api.nasa.gov/' POD_ENDPOINT = 'planetary/apod' API_KEY = 'DEMO_KEY' if not os.path.exists(IMAGE_FOLDER): os.makedirs(IMAGE_FOLDER) def get_info(date=datetime...
92
29.29
95
22
584
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_62294a63b603a65c_e935cc81", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 83 ]
[ null ]
[ 42 ]
[ 46 ]
2024-11-19T02:01:07.577823+00:00
1,468,851,656,000
4bf6119faef7163450decb3d1896785c42361f3d
3
{ "blob_id": "4bf6119faef7163450decb3d1896785c42361f3d", "branch_name": "refs/heads/master", "committer_date": 1468851656000, "content_id": "b09ab81f7f22c54be9e7a88f57222e7cb93f4fdb", "detected_licenses": [ "MIT" ], "directory_id": "1abf3b2e695ba535973a622682771734eca26abd", "extension": "py", "fi...
2.640625
stackv2
import sys def ask_execution_mode(config): print("What is the execution mode (once/scheduler):", end="", flush=True) config['ExecutionMode'] = sys.stdin.readline().strip('\n') if not (config['ExecutionMode'] == 'once' or config['ExecutionMode'] == 'scheduler'): print("Sorry, only once or scheduler...
101
38.49
117
13
934
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_39200dd41234ecf8_9fa14abb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 80 ]
[ null ]
[ 13 ]
[ 80 ]
2024-11-19T02:01:08.668456+00:00
1,575,731,252,000
273d2fbd4d51e3eeb6453f6b5819184695b8312c
3
{ "blob_id": "273d2fbd4d51e3eeb6453f6b5819184695b8312c", "branch_name": "refs/heads/master", "committer_date": 1575731252000, "content_id": "97718e5148ff673c5c3397361b1f8265f6fa7a61", "detected_licenses": [ "MIT" ], "directory_id": "e1d197184d50339a91c60681af6b58906de36612", "extension": "py", "fi...
2.625
stackv2
class MainWindow(Frame): def __init__(self, master): super(MainWindow, self).__init__(master) self.grid() self.configure(padx = 20, pady = 20) self.createFoodMenuList() #self.create_customer_widgets() self.create_menu() self.add_menu(master) def createFood...
234
47.39
164
13
3,052
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d1b70b8cf9ff3972_678a9f39", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 162 ]
[ null ]
[ 44 ]
[ 52 ]
2024-11-19T00:27:23.289932+00:00
1,579,281,839,000
36614acf1f89420b9d6b3579aad0a6c083cd473c
3
{ "blob_id": "36614acf1f89420b9d6b3579aad0a6c083cd473c", "branch_name": "refs/heads/master", "committer_date": 1579281839000, "content_id": "96234749203de31f32e65420c3c62f9519578289", "detected_licenses": [ "MIT" ], "directory_id": "1652b5abd9caee429aa0b08cea6fd7dcf2e173d2", "extension": "py", "fi...
2.8125
stackv2
import logging from uber_rides.session import Session from uber_rides.client import UberRidesClient from kalliope.core.NeuronModule import NeuronModule, InvalidParameterException logging.basicConfig() logger = logging.getLogger("kalliope") class Uber (NeuronModule): def __init__(self, **kwargs): super(U...
119
39.27
137
22
894
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8eeb95c8fea17d7e_37cc98f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 26 ]
[ null ]
[ 22 ]
[ 40 ]
2024-11-19T00:40:26.619671+00:00
1,547,732,952,000
fa4d757de2e3ef7eb738c4520b2913efef6e1f04
2
{ "blob_id": "fa4d757de2e3ef7eb738c4520b2913efef6e1f04", "branch_name": "refs/heads/master", "committer_date": 1547732952000, "content_id": "aebacbff88644f6b11b87656284f7f87a822a746", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "7f56b5f6f8f6159573732daff5c5b0f322da19c6", "extension": "p...
2.375
stackv2
import hmac import hashlib from django.conf import settings from django.contrib.auth.models import User from .models import TurnusersLt def sync_new_user_to_coturn(sender, instance, **kwargs): ## # NOTE: Do not use this for REST API. You do not need to sync users if you are using the REST API. # # ...
43
47.19
149
20
445
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c0c44a0ac6363523_89e63241", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 39 ]
[ null ]
[ 62 ]
[ 86 ]
2024-11-19T01:17:22.795519+00:00
1,459,684,593,000
e803aff1afbdb39dce7e2ccfd650879a065fc21c
3
{ "blob_id": "e803aff1afbdb39dce7e2ccfd650879a065fc21c", "branch_name": "refs/heads/master", "committer_date": 1459684593000, "content_id": "3d51f4adf1bf60e042320f0347f8c2c6c68aef7d", "detected_licenses": [ "MIT" ], "directory_id": "b64e39f9e28a8697b4bcaf5dab9ba50295954585", "extension": "py", "fi...
2.578125
stackv2
import tarfile import os import resize ROOT = "/home/efrat/Documents/19.11.15" DEST = "/home/efrat/Documents/images" TUMB = "/home/efrat/Documents/thumbs" def untar(f): zip = tarfile.open(f) zip.extractall(DEST) for root, subFolders, files in os.walk(ROOT): for f in files: filename, file_extension = os...
23
18.65
48
16
134
python
[{"finding_id": "codeql_py/tarslip_f449b6cd2e6ab4ee_110eb555", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 12 ]
[ null ]
[ 2 ]
[ 5 ]
2024-11-19T01:17:39.432490+00:00
1,305,665,737,000
208d4ebab8e86280572b432b411d69ef712895bc
2
{ "blob_id": "208d4ebab8e86280572b432b411d69ef712895bc", "branch_name": "refs/heads/master", "committer_date": 1305665737000, "content_id": "be9fe9bcfc2dba9a8c1105700f59b2c55b382f7d", "detected_licenses": [ "BSD-2-Clause", "BSD-3-Clause", "MIT" ], "directory_id": "a78df507e855bccd780821c16e70e...
2.375
stackv2
import urllib2 import urllib import time import thread import tempfile import shutil import os import lib.jsonrpclib as jsonrpclib import utils from base_media_backend import BaseMediaBackend class XBMCMediaBackend(BaseMediaBackend): """ The XBMC media backend uses a hybride Web_Server_HTTP_API / JSON-RPC AP...
263
33.18
103
16
1,883
python
[{"finding_id": "codeql_py/overly-permissive-file_38909339896394a6_a586667b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 37 ]
[ null ]
[ 9 ]
[ 38 ]
2024-11-19T01:17:42.169940+00:00
1,596,878,729,000
d730a4c748dcb9d3d33c92fad1530c8649c4e32c
3
{ "blob_id": "d730a4c748dcb9d3d33c92fad1530c8649c4e32c", "branch_name": "refs/heads/master", "committer_date": 1596878729000, "content_id": "c7c63dbda49f0a4473abce02ccb9eab25b30125c", "detected_licenses": [ "MIT" ], "directory_id": "fbbf3619246a346047bdee9f355343ddd8f81d97", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python3 """Commands to create and store the various kinds of secrets we need. Uses google secretsmanager api. See: https://cloud.google.com/secret-manager/docs """ # python -m tools.secrets from pathlib import Path from sha3 import keccak_256 import argparse import coincurve import google.oauth2.crede...
198
34.49
128
20
1,763
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c6a159ea2b918e8_65e7820f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 74 ]
[ null ]
[ 15 ]
[ 59 ]
2024-11-19T00:43:48.743615+00:00
1,612,000,640,000
18b6fac5f0b960914032ae6f376b9e1f17b3d3c1
3
{ "blob_id": "18b6fac5f0b960914032ae6f376b9e1f17b3d3c1", "branch_name": "refs/heads/main", "committer_date": 1612000640000, "content_id": "087ea4751446eb907c4419d34729635c0649a1e8", "detected_licenses": [ "MIT" ], "directory_id": "12aee78382d00aba87d6e25b5cc6cf9215070e84", "extension": "py", "file...
2.78125
stackv2
import requests from flask import Flask, request CLIENT_ID = '' CLIENT_SECRET = '' GITHUB_TOKEN_URL = 'https://github.com/login/oauth/access_token' app = Flask(__name__) @app.route('/') def index(): return '<a href="https://github.com/login/oauth/authorize?client_id={}"> Login with Github</a>'.format(CLIENT_ID...
26
29.31
118
10
188
python
[{"finding_id": "codeql_py/flask-debug_55813f091fe27f02_7a6d5b15", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 26, 23 ]
[ null, null ]
[ 5, 13 ]
[ 24, 64 ]
2024-11-19T00:43:54.146798+00:00
1,591,360,824,000
b8db7cebe24c92a94bd5300278998fd528ee3758
3
{ "blob_id": "b8db7cebe24c92a94bd5300278998fd528ee3758", "branch_name": "refs/heads/master", "committer_date": 1591360824000, "content_id": "4fb3a32f1f78d3155e6ba8fc594e7d1a6fe0ab45", "detected_licenses": [ "MIT" ], "directory_id": "987d257ff869b115a2aced532b8b4bef6e9a07cd", "extension": "py", "fi...
2.890625
stackv2
# -*- coding: utf-8 -*- """ 使用方法:命令行中输入:文件名 -n <小偶像名字全部或部分> 或者直接使用下方def searchmember print(searchmember("小偶像名字全部或部分")) 命令行示例: root# python3 CQBot_hzx/searchMember.py -n 洪珮雲 result are as follows: room name: 聊天室A room id: 67313743 ownerId:63558 ownerName:洪珮雲 root# python3 CQBot_hzx/searchMember.py -n 洪 result are as...
88
25.62
165
18
752
python
[{"finding_id": "codeql_py/request-without-cert-validation_38613c8e96459f08_7eb40464", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 58 ]
[ 63 ]
[ 20 ]
[ 24 ]
2024-11-19T01:44:11.786895+00:00
1,689,731,420,000
aa5e1e6cec253d6ec614410b344bec92752cff25
2
{ "blob_id": "aa5e1e6cec253d6ec614410b344bec92752cff25", "branch_name": "refs/heads/master", "committer_date": 1689731420000, "content_id": "3371dfafff73fdcdf9b9f86b93513c19585a3aef", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5aaa665087a055a44e9048aba662b49e63041336", "extension": "py"...
2.46875
stackv2
# Copyright 2018 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, ...
70
36.44
80
13
570
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_0c6a784a95c80e59_bcc71a12", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [app.k8s.io/](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [app.k8s.io/](1) may be at an arbitrary position in the sanitized URL." ]
[ 64 ]
[ null ]
[ 7 ]
[ 48 ]
2024-11-19T00:59:43.534631+00:00
1,499,171,653,000
d0cd9aa843aabbebe4d6bcfb39234d68c706ebeb
2
{ "blob_id": "d0cd9aa843aabbebe4d6bcfb39234d68c706ebeb", "branch_name": "refs/heads/master", "committer_date": 1499171653000, "content_id": "ba8d088df915d0c111e443f8913899fb5f93d002", "detected_licenses": [ "MIT" ], "directory_id": "3dd75f923e205d5e552e68f019a936f8adb04ff4", "extension": "py", "fi...
2.328125
stackv2
# -*- coding: utf-8 -*- # sudo /srv/homeassistant/bin/python /home/homeassistant/.homeassistant/check_motion_config.py """ # Este script está preparado para ejecutarse en el boot, de forma que corrija la configuración de cámaras en MotionEye hasta que se implemente la edición de comando en final de evento ('on_event_e...
84
41.95
118
21
975
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ca6ad899ae2288e6_42455bdf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 69 ]
[ null ]
[ 31 ]
[ 114 ]
2024-11-19T00:59:46.874926+00:00
1,574,195,918,000
828299c628c31bde4c06e842c6e044abf3d1ab01
2
{ "blob_id": "828299c628c31bde4c06e842c6e044abf3d1ab01", "branch_name": "refs/heads/master", "committer_date": 1574195918000, "content_id": "dcd9380711bb23f255740649dafa35c1ed94ae66", "detected_licenses": [ "MIT" ], "directory_id": "056fb3d8021848b225be8d52217d25e63196c5fd", "extension": "py", "fi...
2.375
stackv2
import torch import numpy as np from decimal import Decimal, getcontext import base64 import zlib import math import copy from baseconvert import base torch.hub.list('pytorch/fairseq') import fairseq from fairseq.search import Sampling # def text2decimal(text): # compressed_text_data = text.encode('utf-8')#zlib.co...
296
42.75
141
25
3,390
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_78198de719dafcd7_9e0e5f3f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 248 ]
[ null ]
[ 11 ]
[ 22 ]
2024-11-19T01:00:02.476718+00:00
1,627,394,632,000
93ed8e4f072711edaad83ebe565ca3f3a952481f
4
{ "blob_id": "93ed8e4f072711edaad83ebe565ca3f3a952481f", "branch_name": "refs/heads/main", "committer_date": 1627394632000, "content_id": "7960da8daabee3bdf5c23751f7635bf3af6d4551", "detected_licenses": [ "MIT" ], "directory_id": "f56544a64dc497ef59786008781b402850225efd", "extension": "py", "file...
3.765625
stackv2
import re # dummy user data userData = [("helo", "helo@x.com", 17), ("alex", "alex@y.com", -20), ("nova", "novaz.com", 20)] # custom exception class class NotUniqueUsernameException (Exception): def __init__ (self, name): self.name = name def __str__ (self): return "Username (%s) already exists." % (self.name) ...
57
26.33
95
12
449
python
[{"finding_id": "codeql_py/redos_54c0aff1e7b1fe8b_1577d75c", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'." ]
[ 44, 44 ]
[ null, null ]
[ 20, 37 ]
[ 34, 51 ]
2024-11-19T01:21:25.990378+00:00
1,546,491,077,000
536b8b299db4a2c20d23c2fdc98a5b1c9e19793f
2
{ "blob_id": "536b8b299db4a2c20d23c2fdc98a5b1c9e19793f", "branch_name": "refs/heads/master", "committer_date": 1546491077000, "content_id": "2d114abfa559e86c378e6ab13964585b369e8d32", "detected_licenses": [ "MIT" ], "directory_id": "1b6461df367242527e93da2a0c51d850948bedf2", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python2 import os import operator from flask import Flask, request, jsonify, send_from_directory from flask_pymongo import PyMongo, ASCENDING from flask_socketio import SocketIO from flask_cors import CORS from bson.objectid import ObjectId from models.user import User from models.meme import Meme fro...
409
30.49
119
16
2,715
python
[{"finding_id": "codeql_py/path-injection_0252c0f137bf5a4a_a67187a6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 403 ]
[ null ]
[ 27 ]
[ 59 ]
2024-11-19T01:21:38.931777+00:00
1,601,120,102,000
bc1ceecf6c3390baff0b79fa36467dc713ed2ba5
3
{ "blob_id": "bc1ceecf6c3390baff0b79fa36467dc713ed2ba5", "branch_name": "refs/heads/master", "committer_date": 1601120102000, "content_id": "8b6c28be214f9ae8f9face189cab834a333c478a", "detected_licenses": [ "MIT" ], "directory_id": "841a9976e31f6359d46538b107e1268792b6715d", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import logging from telegram import (ReplyKeyboardMarkup, ReplyKeyboardRemove) from telegram.ext import (Updater, CommandHandler, MessageHandler, Filters, ConversationHandler) from weather import getWeatherAtCoords # Enable logging logging.basi...
99
29.13
83
17
647
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a7265fec1b17f1a_83de786e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 34, 35 ]
[ null, null ]
[ 61, 17 ]
[ 83, 40 ]
2024-11-19T01:33:50.138493+00:00
1,594,772,042,000
15b92d5fed7d59a724014d12f06b453617ea3238
2
{ "blob_id": "15b92d5fed7d59a724014d12f06b453617ea3238", "branch_name": "refs/heads/master", "committer_date": 1594772042000, "content_id": "48c25a2923a77e5592008d4b262bc4871d8073be", "detected_licenses": [ "MIT" ], "directory_id": "4d86100281031513ea24cc98dcaf16183fb49671", "extension": "py", "fi...
2.328125
stackv2
#from __future__ import print_function , unicode_literal import jinja2 import time import csv cancel = False device_list= [] with open ('dev_list.yml' , 'w') as f: f.writelines("---\n\n") file = csv.reader(open('switches-list.csv'),delimiter = ',') next(file) for line in file : dev_name = line[2] ...
28
26.64
95
11
196
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e6f71c781eba8355_4f7ed96c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 20 ]
[ 45 ]
2024-11-19T01:56:36.611348+00:00
1,502,625,880,000
d29f60d0341e267111c66fb5af5b2a3a58c829b5
3
{ "blob_id": "d29f60d0341e267111c66fb5af5b2a3a58c829b5", "branch_name": "refs/heads/master", "committer_date": 1502625880000, "content_id": "c92d3233e4f1cbb8f4ad463a1b991356f4fef5d3", "detected_licenses": [ "MIT" ], "directory_id": "c511110f326b6e2fe702e05321498b35d8448699", "extension": "py", "fi...
2.609375
stackv2
# coding=utf-8 import sublime import sublime_plugin import re class QuickGotoCommand(sublime_plugin.TextCommand): def doCommand(self, edit, prifix, reg, show_files = True): for sel in self.view.sel(): if sel.empty(): sel = self.view.word(sel) word_sel = self.view.sub...
39
39.72
130
17
393
python
[{"finding_id": "codeql_py/overly-large-range_97e2376d0dc618c8_dd4482ab", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9\\].", "remediation": "", "location": {"...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9\\].", "Suspicious character range that is equivalent to \\[@A-Z\\\\[\\\\\\\\]^_`a-z{{\\]." ]
[ 38, 38 ]
[ null, null ]
[ 42, 47 ]
[ 45, 50 ]
2024-11-19T01:56:38.938546+00:00
1,585,167,064,000
e98e476a1f5a35f7bef9f1ffbc71391ad0544b91
2
{ "blob_id": "e98e476a1f5a35f7bef9f1ffbc71391ad0544b91", "branch_name": "refs/heads/master", "committer_date": 1585167064000, "content_id": "67f755aca2ab287e0c876f8c81aff3700ea7de57", "detected_licenses": [ "MIT" ], "directory_id": "eb57e632fb351db1975ad0e15bd480759bbc153b", "extension": "py", "fi...
2.34375
stackv2
from rest_framework import status, viewsets from rest_framework.decorators import action from rest_framework.exceptions import NotFound, ValidationError from rest_framework.response import Response from .mixins import ( RetrieveMixin, ListMixin ) from .. import services from ..models import Task from ..seriali...
183
27.92
72
15
1,051
python
[{"finding_id": "codeql_py/stack-trace-exposure_2837e8ffb9ef959d_60faef37", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 87, 177 ]
[ null, null ]
[ 35, 35 ]
[ 38, 38 ]
2024-11-19T01:56:44.540745+00:00
1,670,472,964,000
2706e9640500f1906dd295330987f59eb22ab335
3
{ "blob_id": "2706e9640500f1906dd295330987f59eb22ab335", "branch_name": "refs/heads/master", "committer_date": 1670472964000, "content_id": "ed368771aff16c6f0581b5a479d24ee310fd2ed0", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "77a2199488e00a2d71ce92bfc2cb1e5d1067ee3f", "extension": "p...
2.65625
stackv2
"""Endpoint decorators The Dorest project :copyright: (c) 2020 Ichise Laboratory at NII & AIST :author: Rungsiman Nararatwong """ import importlib from functools import wraps from typing import Any, Callable, List from django.conf import settings from rest_framework import status from rest_framework.request import ...
70
41.3
142
26
616
python
[{"finding_id": "codeql_py/stack-trace-exposure_7d818c0362a564ba_37f6554c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 55 ]
[ null ]
[ 37 ]
[ 59 ]
2024-11-19T01:56:49.401150+00:00
1,623,728,711,000
bd748a5c4d82d352d14e0754f562a1d4b5a53370
3
{ "blob_id": "bd748a5c4d82d352d14e0754f562a1d4b5a53370", "branch_name": "refs/heads/main", "committer_date": 1623728711000, "content_id": "e36b6b1e49720795ee9a6e770b85afed0b6b7945", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "7dc65f7a42a151f24a35cf16e112ee3ad9c2d8de", "extension": "py"...
2.53125
stackv2
import os import sys from pathlib import Path import hashlib from base64 import b64encode, b64decode from Cryptodome.Cipher import AES from Cryptodome.Random import get_random_bytes from Crypto.Util.Padding import pad, unpad from PyQt5 import QtWidgets from PyQt5.QtCore import Qt from PyQt5.QtWidgets import QMainWindow...
238
40.16
131
20
2,318
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_8a33c7ca6dcc0e0c_2594ef04", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 132, 156 ]
[ null, null ]
[ 35, 32 ]
[ 63, 56 ]
2024-11-19T02:10:27.260436+00:00
1,450,238,644,000
851dd24a12c51b9efab2ab2e33d46001bcd2c382
2
{ "blob_id": "851dd24a12c51b9efab2ab2e33d46001bcd2c382", "branch_name": "refs/heads/master", "committer_date": 1450238644000, "content_id": "f9040a5daceefb40a674938fab9ee19d66f7e9a9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8e4dd269b102620b824d6b2c5888e1e45b302657", "extension": "py"...
2.3125
stackv2
#!/usr/bin/env python import cv2 import numpy as np import argparse import math import pickle from sklearn.decomposition import PCA from nmf_support import * import sys, os if __name__ == '__main__': #------------------------------------------------------ # Args parser #--------------------------------------...
100
32.23
107
16
942
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1a5269b93d4ed303_f817c5bd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 94 ]
[ null ]
[ 18 ]
[ 107 ]
2024-11-19T02:10:27.975659+00:00
1,590,045,474,000
a86d9f07365229b0380de3aa2b1a6e371fe5ac59
3
{ "blob_id": "a86d9f07365229b0380de3aa2b1a6e371fe5ac59", "branch_name": "refs/heads/master", "committer_date": 1590045474000, "content_id": "152105459826610c9db711965acd7bc3baf6a5a0", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "528db1ec466269f0137d49da9737aa51ee55e55e", "extension": "p...
2.5625
stackv2
import datetime import json import numpy as np import traceback from cloudvolume import CloudVolume # Import local modules import process import config from flask import Flask, request, make_response, jsonify app = Flask(__name__) @app.route("/") def hello(): """Return service running.""" running = datetim...
91
25.18
92
17
553
python
[{"finding_id": "codeql_py/stack-trace-exposure_dd1dd39fecd2c8e9_55a1a8ae", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 55, 67, 81 ]
[ null, null, null ]
[ 16, 16, 38 ]
[ 33, 33, 56 ]
2024-11-19T02:10:34.032892+00:00
1,610,153,756,000
9559546f91fac0ed3a8e55bd05ad17f40268f7ab
3
{ "blob_id": "9559546f91fac0ed3a8e55bd05ad17f40268f7ab", "branch_name": "refs/heads/main", "committer_date": 1610153756000, "content_id": "baafe768b7c5e8d73f5f8fbd2137d86fdb548378", "detected_licenses": [ "MIT" ], "directory_id": "e8e940333c4f74e4ac3ef08182b6258dc89e0438", "extension": "py", "file...
2.671875
stackv2
from flask import Flask, render_template, request, url_for, redirect from flask_restful import Resource, Api from flask_cors import CORS import requests import json app = Flask(__name__) CORS(app) ## To allow direct AJAX calls @app.route("/", methods=["GET"]) def home(): url = "http://localhost:8000/api/books" ...
50
23.12
70
13
299
python
[{"finding_id": "codeql_py/flask-debug_046465d12fe62385_e7d5ed5d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 50, 45 ]
[ null, null ]
[ 4, 10 ]
[ 25, 41 ]
2024-11-19T02:45:49.415934+00:00
1,669,357,592,000
a375c0926b28abba8b25eef8d1c124017713fa14
3
{ "blob_id": "a375c0926b28abba8b25eef8d1c124017713fa14", "branch_name": "refs/heads/master", "committer_date": 1669357592000, "content_id": "564747ddf028fcd6adc9a3a852b962332cd87076", "detected_licenses": [ "MIT" ], "directory_id": "a7b17fc8b67f344869a88500c5d92dd1fc5294b2", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/python3 import base64 import os import shutil ## 模板套用函数 def alter(file,old_str,new_str): with open(file,'r+',encoding='utf-8') as ca: wc = ca.readlines() with open('new','w+',encoding='utf-8') as cb: for i in wc: if old_str in i: i = i.rep...
78
32.23
74
16
644
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_9046de90b19eb278_81555247", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 14, 64 ]
[ null, null ]
[ 30, 11 ]
[ 31, 64 ]
2024-11-19T02:45:49.918719+00:00
1,572,169,189,000
505287c95aa285c1c8fbdb9b910b1d17af8e3b1a
3
{ "blob_id": "505287c95aa285c1c8fbdb9b910b1d17af8e3b1a", "branch_name": "refs/heads/master", "committer_date": 1572169189000, "content_id": "8a1f5fe393e205116416e77ecb2978d84dcf43ec", "detected_licenses": [ "MIT" ], "directory_id": "bee81a13f17874edd0b4a79cf2afc35c7dcb9cee", "extension": "py", "fi...
2.859375
stackv2
from flask import Flask from waitress import serve DESARROLLO=True PUERTO_ACCESO=5000 app = Flask(__name__) @app.route("/health") def health_ok(): return "ok McKay" @app.route("/") def hello(): return "¡Hola mundo!" @app.route("/echo/<texto>") def echo(texto): return(texto) if __name__ == '__main__': if DESAR...
25
17.6
70
12
139
python
[{"finding_id": "codeql_py/flask-debug_108fe733be94e42b_14545381", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 23, 19 ]
[ null, null ]
[ 3, 9 ]
[ 22, 14 ]
2024-11-19T02:57:21.526457+00:00
1,636,642,615,000
435d9cffb81cd7cac4753753539268d98b90301c
4
{ "blob_id": "435d9cffb81cd7cac4753753539268d98b90301c", "branch_name": "refs/heads/master", "committer_date": 1636642615000, "content_id": "ab4266509b0fd7e7596bf8b0236b2c2321193aa2", "detected_licenses": [ "MIT" ], "directory_id": "5c45555b9ab5e3627123830b83d9a7cc285902f9", "extension": "py", "fi...
3.796875
stackv2
class Person: def __init__(self, name, age, height, weight, gender): self.name = name self.age = age self.height = height self.weight = weight self.gender = gender try: if isinstance(age, str): self.age = int(age) if isinsta...
45
28.93
119
16
390
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf6565a709ca3baf_021a91b7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 42 ]
[ null ]
[ 33 ]
[ 54 ]
2024-11-19T03:12:09.210165+00:00
1,534,322,369,000
afa612e042f904ec9c5a397640dfd9fd8e84bcd9
3
{ "blob_id": "afa612e042f904ec9c5a397640dfd9fd8e84bcd9", "branch_name": "refs/heads/master", "committer_date": 1534322369000, "content_id": "ea3b0f4f6810e1e5908617887dc8f06558e2a1d4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dc2f4a77e8b1dd50817db99b51d980884aedc13f", "extension": "py"...
3.375
stackv2
import string as sg import random import json class PassGenerator(): file_name = None mypasslist = [] def __init__(self, file_name): self.file_name = file_name while True: menu = self.input_control_error(""" Please select an action: 1 - Create new passw...
99
29.71
107
19
608
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f1800bfdf5464ee9_aedb1965", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 79, 85 ]
[ null, null ]
[ 19, 23 ]
[ 42, 46 ]
2024-11-19T03:12:09.491947+00:00
1,516,840,744,000
4c1f82be585f548749c8715455da0839c0b2446d
2
{ "blob_id": "4c1f82be585f548749c8715455da0839c0b2446d", "branch_name": "refs/heads/master", "committer_date": 1516840744000, "content_id": "53feb44712a38d508405c7ffd44ee93781c0b80b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "911731c86674e0809b5c1c7f30b8553c2e8d5745", "extension": "py"...
2.46875
stackv2
""" module that defines a bottle routing app that can grafted onto cherrypy """ import logging from functools import wraps from datetime import datetime from bottle import Bottle, request, response, static_file from webdep import PUBDIR from webdep.templates import INDEX_TEMPLATE, ERROR_TEMPLATE # get instance of ...
92
25.33
79
13
531
python
[{"finding_id": "codeql_py/log-injection_e748ea4717b33db3_5a3be5fb", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 27, 46 ]
[ 33, 52 ]
[ 22, 19 ]
[ 14, 10 ]
2024-11-19T01:33:39.117271+00:00
1,597,227,470,000
c8bf7988224ac8d2297a3ee16734734f585d003f
3
{ "blob_id": "c8bf7988224ac8d2297a3ee16734734f585d003f", "branch_name": "refs/heads/master", "committer_date": 1597227470000, "content_id": "ac03741c9d483b9e10fea0a573c43d78d3d6f548", "detected_licenses": [ "MIT" ], "directory_id": "08d6af60974955e32c1a33b593f393f1b94f4696", "extension": "py", "fi...
2.734375
stackv2
import os import json from sqlalchemy import create_engine import snowflake.connector import configparser try: import boto3 except ImportError as e: print('Cannot import boto3, if you want to use credsman_connect, please' ' ensure that boto3 is installed') class SnowConn: _alchemy_engine = None...
320
39.12
126
17
2,687
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_44dd161fc94f6fa5_f3528c0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text." ]
[ 305 ]
[ 306 ]
[ 17 ]
[ 60 ]
2024-11-19T01:33:40.478971+00:00
1,431,585,205,000
6edc021c423602aba1efe6483c891f297b7b506f
2
{ "blob_id": "6edc021c423602aba1efe6483c891f297b7b506f", "branch_name": "refs/heads/master", "committer_date": 1431585205000, "content_id": "f6faa3d90970afe74aacc4084dbec4c660b1a6b2", "detected_licenses": [ "MIT" ], "directory_id": "ca86f17aca0e22160a599f23ec6975a53ac96dfc", "extension": "py", "fi...
2.3125
stackv2
#setup.py #!/usr/bin/python #Quam Sodji Copyright 2015 import subprocess import os import time import shutil """Configure the pieces for hostname generator""" #### Modifiable fields ########### DS_repo_path = 'Full path to DS Repo' ############### Paths ############### Biplist_url = 'https://bitbucket.org/wooster/b...
85
28.06
97
11
600
python
[{"finding_id": "codeql_py/overly-permissive-file_6a4f55629dd43667_04fda36b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 55, 82 ]
[ null, null ]
[ 5, 15 ]
[ 28, 57 ]
2024-11-19T01:33:44.676706+00:00
1,507,621,189,000
94a41b64da8ed21c98ca25ce08c9d868a933edd1
3
{ "blob_id": "94a41b64da8ed21c98ca25ce08c9d868a933edd1", "branch_name": "refs/heads/master", "committer_date": 1507621189000, "content_id": "798d5fbae6aa2647fd7f94391dc2cb46ff0ffc20", "detected_licenses": [ "MIT" ], "directory_id": "21c8a6e3d6bf280e749f0a6ed38308cd99c7435a", "extension": "py", "fi...
2.53125
stackv2
import bcrypt import random import requests from .config import (KEEHOST_URL, KEEHOST_APIKEY, SUPERADMIN, TOKEN_LENGTH, TOKEN_CHARSET) from flask import (Flask, request, jsonify) app = Flask(__name__) @app.route('/') def root(): """ Login service root route """ return jsonify({}) def valid_field(field): ...
86
34.53
155
23
651
python
[{"finding_id": "codeql_py/partial-ssrf_1c8207bcf0181b53_c09b5e90", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
4
true
[ "CWE-918", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 31, 34, 62, 81 ]
[ null, null, 65, 83 ]
[ 17, 21, 25, 17 ]
[ 135, 133, 80, 104 ]
2024-11-19T01:57:31.545323+00:00
1,589,208,401,000
108923cd8b9a42eb606bca1dd452bdd7f385db71
2
{ "blob_id": "108923cd8b9a42eb606bca1dd452bdd7f385db71", "branch_name": "refs/heads/master", "committer_date": 1589208401000, "content_id": "986bc4ea8a20b4e206e5317a261145d9e81d84ad", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "6fe6605aab63a5cd6251ca4074765bf3fe11933a", "extension": "p...
2.390625
stackv2
from flask import Flask, Response, request, abort from urllib.parse import urlparse from werkzeug.routing import Rule import os import psutil import requests import sys def get_routes(): routes = {} for process in psutil.process_iter(attrs=["environ"]): try: host = process.info["environ"][...
83
25.05
78
13
490
python
[{"finding_id": "codeql_py/flask-debug_b1245be957e2ee85_93fe0ace", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
6
true
[ "CWE-215", "CWE-918", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/partial-ssrf", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "...
[ 62, 41, 32, 38, 38, 38 ]
[ 69, 48, null, null, null, null ]
[ 5, 27, 46, 49, 65, 75 ]
[ 6, 6, 54, 63, 73, 79 ]
2024-11-19T02:11:24.498880+00:00
1,551,364,562,000
7102781873ebc438db0973c51c006c4494b40e6a
3
{ "blob_id": "7102781873ebc438db0973c51c006c4494b40e6a", "branch_name": "refs/heads/master", "committer_date": 1551459421000, "content_id": "c394d9fc449e0aafc34397a27055cbd313b381b1", "detected_licenses": [ "MIT" ], "directory_id": "033728a8a9f35da6e0905e40ce6fa1e7c7a3112c", "extension": "py", "fi...
2.953125
stackv2
""" Provides FacePP Demo. """ from __future__ import print_function, unicode_literals import json from . import FacePP, exceptions def face_detection(app): """ Detect and analyze human faces within the image that you provided. """ print('[Face Detection]') img_url = 'https://www.faceplusplus.c...
230
32.93
111
15
1,844
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b9bfd01620545108_fb3b582c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 28, 115, 174 ]
[ null, null, null ]
[ 30, 30, 30 ]
[ 51, 51, 51 ]
2024-11-19T02:11:31.169345+00:00
1,549,246,818,000
d106af1a129315c339f8a50e1a74afc7215069fc
3
{ "blob_id": "d106af1a129315c339f8a50e1a74afc7215069fc", "branch_name": "refs/heads/master", "committer_date": 1549246818000, "content_id": "e8af40400d57111c705b61330a68580f9ef1e32f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "6b7726eb1ab13a86634e435e14abeb80a5bf3588", "extension": "p...
2.9375
stackv2
""" app module maintains the initiation of flask application and data ingestion and cleansing process Author: Srinivas Rao Cheeti email: srinivascheeti1@gmail.com Date: Feb 2, 2019 """ from flask import Flask, request, jsonify, render_template from flask import abort import logging try: import app_worker except...
152
38.2
114
17
1,367
python
[{"finding_id": "codeql_py/flask-debug_4f6d262f3dffac82_2c52e130", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).", "This log entry depend...
[ 149, 62, 79, 113 ]
[ null, null, null, null ]
[ 9, 18, 18, 18 ]
[ 49, 95, 114, 94 ]
2024-11-19T02:11:44.173767+00:00
1,556,439,984,000
4806cb5640a6a1794266468b32225d31a95a5152
2
{ "blob_id": "4806cb5640a6a1794266468b32225d31a95a5152", "branch_name": "refs/heads/master", "committer_date": 1556439984000, "content_id": "8c79df4849b8fa3194ff4b7ce111831b5032a533", "detected_licenses": [ "MIT" ], "directory_id": "0579a04f2d9b1e2769d5f8361ba8d970f46dab23", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python3 import logging import os import random import string import sys import twilio.rest from profanityfilter import ProfanityFilter sys.path.append(os.path.join(os.path.dirname(__file__), './..')) # noqa: I003 import mqtt_json # noqa: E402,I001 logger = logging.getLogger('sms-print-gateway') SEN...
79
32.65
86
12
616
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c1e57d932cb122e6_d8bb2ed0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 77 ]
[ null ]
[ 18 ]
[ 60 ]
2024-11-19T02:11:49.792102+00:00
1,550,313,461,000
e06669585e4813211fde20c44034bd9e7362e2c0
3
{ "blob_id": "e06669585e4813211fde20c44034bd9e7362e2c0", "branch_name": "refs/heads/master", "committer_date": 1550313461000, "content_id": "c9d301e0a9f97d52bea18cdcf4ac8109e763728b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bba2bffcdf2867a586550323211518fb69ef8474", "extension": "py"...
2.515625
stackv2
import tensorflow as tf import numpy as np import os.path import hashlib import sys import tarfile import time from io import BytesIO from six.moves import urllib from tensorflow.python.platform import gfile from PIL import Image # DATA_URL = 'http://download.tensorflow.org/models/image/imagenet/inception-v3-2016-03-...
110
36.65
104
18
984
python
[{"finding_id": "codeql_py/tarslip_9136cb0252f95922_2265041f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 47 ]
[ null ]
[ 5 ]
[ 35 ]
2024-11-19T02:33:43.465356+00:00
1,634,394,652,000
50a7ad4f3355289a9d1462c02d39bd2bd077366b
3
{ "blob_id": "50a7ad4f3355289a9d1462c02d39bd2bd077366b", "branch_name": "refs/heads/master", "committer_date": 1634394652000, "content_id": "4a15f429d8063cb5824490e339b34e7092ccf450", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ad105c4dca820dfda688c569c4f23e484c666b5f", "extension": "py"...
2.765625
stackv2
import re import os import logging from distutils.version import StrictVersion WARNING_LEVEL = 'Low' ID_PREFIX = 'coverity' def get_error_indices(raw_input_file): """This function gets the indices of the first line of all Coverity warnings. Inputs: - raw_input_file: Full path to the file containing ...
250
37.79
112
22
2,164
python
[{"finding_id": "codeql_py/overly-permissive-file_2825f8cadd54d442_cf8540c7", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
3
true
[ "CWE-732", "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 100, 166, 231 ]
[ null, null, null ]
[ 5, 5, 5 ]
[ 38, 38, 38 ]
2024-11-19T02:59:18.036905+00:00
1,469,028,459,000
9b9b8cc665ddf8039e47ed3bb6b3892bcb39115e
3
{ "blob_id": "9b9b8cc665ddf8039e47ed3bb6b3892bcb39115e", "branch_name": "refs/heads/master", "committer_date": 1469028459000, "content_id": "97c919f979b89f346c627ff399346dc9fbd97ba6", "detected_licenses": [ "MIT" ], "directory_id": "e319d0ac37bc57e0c04c2356ba105a62106eb650", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python import json import jinja2 import logging import webapp2 from google.appengine.api import urlfetch class MainHandler(webapp2.RequestHandler): def get(self): """Respond to HTML GET requests""" logging.info("===== %s.get()" % self.__class__.__name__) template = jinja_env.g...
44
25.73
113
15
287
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c584fd16b167ae5b_80203f9d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 40 ]
[ null ]
[ 13 ]
[ 76 ]
2024-11-19T02:59:26.170632+00:00
1,692,279,512,000
f2f04cd3086d2cb16d7e1678bbf950a1f0fd7a5d
3
{ "blob_id": "f2f04cd3086d2cb16d7e1678bbf950a1f0fd7a5d", "branch_name": "refs/heads/master", "committer_date": 1692279512000, "content_id": "6b5ceae2918535bd5030f0126fa25eab8c87b063", "detected_licenses": [ "MIT" ], "directory_id": "82a40fd597a3edb2a2edda2a87e055f89ea98a79", "extension": "py", "fi...
2.84375
stackv2
"Various utility functions." import datetime import email.message import hashlib import smtplib import string import uuid import unicodedata import couchdb2 import marko from publications import constants from publications import settings import publications.database def get_iuid(): "Return a unique instance ...
286
30.63
85
20
1,925
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_25c7fb2634104271_0cce11ca", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 27, 28 ]
[ null, null ]
[ 29, 19 ]
[ 70, 43 ]
2024-11-19T02:59:34.672313+00:00
1,588,011,334,000
1d2fb6afddbf061ec357d726446b338c1b15ce4c
2
{ "blob_id": "1d2fb6afddbf061ec357d726446b338c1b15ce4c", "branch_name": "refs/heads/master", "committer_date": 1588011334000, "content_id": "fedd77aafe8f59ec7d2b47c4be01cf35317dbb3d", "detected_licenses": [ "MIT" ], "directory_id": "0244cdfb081766eb977af5baf0365162c6838ae1", "extension": "py", "fi...
2.484375
stackv2
from flask import Flask, render_template, request import requests import json from multiprocessing import Pool from functools import partial app = Flask(__name__) @app.route("/") def init(): return render_template("index.html") @app.route('/api/v1/about', methods=["GET"]) def about_view(): return render_te...
110
30.66
109
18
790
python
[{"finding_id": "codeql_py/stack-trace-exposure_f175e457d2a0b0ee_1b6fef59", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
9
true
[ "CWE-209", "CWE-209", "CWE-215", "CWE-079", "CWE-079", "CWE-079", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "...
[ 36, 46, 108, 26, 28, 32, 56, 72, 83 ]
[ null, null, null, null, null, null, null, null, null ]
[ 16, 16, 5, 24, 24, 24, 20, 24, 24 ]
[ 27, 27, 40, 66, 69, 67, 47, 96, 94 ]
2024-11-19T02:59:54.526642+00:00
1,665,525,302,000
a06208e130d935284d02adf8c00bc8b3a8378efd
3
{ "blob_id": "a06208e130d935284d02adf8c00bc8b3a8378efd", "branch_name": "refs/heads/master", "committer_date": 1665525302000, "content_id": "5d0f254a5ea052efe1d0a71e8e3923a04c99cb22", "detected_licenses": [ "MIT" ], "directory_id": "4529969633702504c4352de00d68025966b6d660", "extension": "py", "fi...
3.046875
stackv2
from hashlib import md5 from Crypto.Cipher import AES KEY_LEN = max(AES.key_size) def derive_password(passwd, salt): pwd = passwd.strip() max_len = KEY_LEN + AES.block_size # Add salt to passwd pwd = pwd.encode("ascii", "ignore") + salt md5_digest = md5(pwd).digest() d = md5_digest + pwd ...
21
21.9
60
12
138
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e8db9d20a6c5a9d4_a01edaf3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 13, 17 ]
[ null, null ]
[ 22, 17 ]
[ 25, 18 ]
2024-11-19T02:59:57.806342+00:00
1,635,520,500,000
ce9268b814677299c1eed447fe28322263570abe
2
{ "blob_id": "ce9268b814677299c1eed447fe28322263570abe", "branch_name": "refs/heads/master", "committer_date": 1635520516000, "content_id": "b8488c0e510241f1083b5893e9af193e63e3997c", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ee1b623579d614941806cbd3ad95a172f6cd535d", "extension": "p...
2.4375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import os import logging from flask import Flask, request import telepot from reddit import authenticate, get_posts from dotenv import load_dotenv from storit import Storit MSG_DB = 'last' SUBS_DB = 'subs' load_dotenv() def get_last_message(user_id): store = St...
123
25.61
111
17
781
python
[{"finding_id": "codeql_py/log-injection_142514920d776f15_b04f634a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 35, 42, 78, 80 ]
[ null, null, null, null ]
[ 19, 23, 31, 23 ]
[ 53, 59, 64, 64 ]
2024-11-19T02:59:59.946249+00:00
1,578,152,212,000
5145bf964e3db42e24255257b49f72dc2a5ff382
4
{ "blob_id": "5145bf964e3db42e24255257b49f72dc2a5ff382", "branch_name": "refs/heads/master", "committer_date": 1578152212000, "content_id": "aaf0f291f3fca7a9037e634df7448f40298886a1", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "0d85c29a7189a1c430b4b846cb35bf502586449d", "extension": "p...
3.6875
stackv2
# -*- coding: utf-8 -*- """ code ==== FSIC parser to operate on Python code blocks extracted from code chunks, in order to generate class definition-compatible code. """ import re def translate(block, period='period'): """Convert the code in `block` to a model-compatible code block. Parameters =======...
259
33.86
80
18
1,995
python
[{"finding_id": "codeql_py/overly-large-range_efea468d142c2f70_f0398b46", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 53, 69, 84 ]
[ null, null, null ]
[ 64, 103, 117 ]
[ 67, 106, 120 ]
2024-11-19T03:24:50.999061+00:00
1,626,939,468,000
e12e4890617502946ddb80114224b5075646f1c4
2
{ "blob_id": "e12e4890617502946ddb80114224b5075646f1c4", "branch_name": "refs/heads/main", "committer_date": 1626939468000, "content_id": "ed9ecf1ed963814ee0295d260e5aa8eff7d17d5b", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "f3df26a7cd7e0e76a6a283d7f33f0d49348f84f3", "extensi...
2.328125
stackv2
""" NeuralWOZ Copyright (c) 2021-present NAVER Corp. Apache License v2.0 """ import nltk from nltk.translate.bleu_score import sentence_bleu import re BOOLEAN = { "hotel-parking": { "yes": [r"(include|have) (free )?parking"], "no": [r"doesn't need to (include|have) (free )?parking"], }, "...
235
31.39
93
19
1,822
python
[{"finding_id": "codeql_py/redos_b595b5dd387d4956_25d5e217", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<span class='emphasis'>' and cont...
6
true
[ "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos", "py/redos", "py/redos", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<span class='emphasis'>' and containing many repetitions of '0'.", "This part of the regular expression may cause exponential backtracking on strings starting with '<span class='emphasis'>same' and containing many re...
[ 137, 137, 178, 178, 229, 229 ]
[ null, null, null, null, null, null ]
[ 37, 52, 41, 56, 37, 74 ]
[ 48, 63, 52, 67, 48, 85 ]
2024-11-19T03:24:52.940625+00:00
1,589,939,159,000
02b275e29a668d6ee6d90fa9b3bfdf8022bac72e
3
{ "blob_id": "02b275e29a668d6ee6d90fa9b3bfdf8022bac72e", "branch_name": "refs/heads/master", "committer_date": 1589939159000, "content_id": "6bd74d575a679f31b2e2f0d15d39046ff7feaffb", "detected_licenses": [ "MIT" ], "directory_id": "c616586cfc1f6f03ce50a4ca57f6f53f2df8e8ae", "extension": "py", "fi...
2.75
stackv2
import os import sys from logging.config import dictConfig from io import StringIO from flask import Flask, request, jsonify # Logs configuration dictConfig({ "version": 1, "formatters": { "console": { "format": "[%(asctime)s] [%(levelname)s] %(module)s: %(message)s" } }, "...
83
23.72
77
16
459
python
[{"finding_id": "codeql_py/stack-trace-exposure_d0eacd214bdff63b_2300d6e0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-094", "CWE-117", "CWE-117" ]
[ "py/stack-trace-exposure", "py/code-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This code execution depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 83, 64, 49, 57 ]
[ null, null, null, null ]
[ 24, 14, 29, 13 ]
[ 59, 29, 71, 64 ]
2024-11-19T03:35:19.189151+00:00
1,557,584,629,000
0b1d78b7cac88006971f39304ce08afae2277efe
3
{ "blob_id": "0b1d78b7cac88006971f39304ce08afae2277efe", "branch_name": "refs/heads/master", "committer_date": 1557584629000, "content_id": "336fb847641a5a134d0abeb78c7c95b73df0233b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "ac4cc4bcf556e6047467be9b4469d32dac79ebda", "extension": "p...
2.546875
stackv2
""" Provides HTML rendered. """ from __future__ import absolute_import, print_function, unicode_literals from future.builtins import super from functools import partial import jinja2 import random import docta.renderers.base as base import docta.utils.fs as fs import docta.utils.md2 as md import docta.utils.meta as met...
196
30.02
88
16
1,286
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_38600f122cb99e1a_c285ce08", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 26 ]
[ null ]
[ 22 ]
[ 64 ]
2024-11-19T01:38:01.979210+00:00
1,537,770,942,000
5508976491e704b8d8461dc30786f630d3716631
3
{ "blob_id": "5508976491e704b8d8461dc30786f630d3716631", "branch_name": "refs/heads/master", "committer_date": 1537770942000, "content_id": "d4cd54f507a6caadf8ec212c11eb06f3e97b095d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "01f85c8e6264fc7e79d47ca3a28e11e064c61f37", "extension": "py"...
2.625
stackv2
from __future__ import print_function import os,sys,gzip,requests,zipfile,tarfile from tqdm import tqdm from six.moves import urllib import time ''' This script is mainly used in cooperation with codes from https://github.com/zsdonghao/text-to-image download flower dataset from : http://www.robots.ox.ac.uk/~vgg/data/f...
125
27.36
120
19
998
python
[{"finding_id": "codeql_py/tarslip_c86190a5b8ea1f33_22eefa49", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 95 ]
[ null ]
[ 4 ]
[ 7 ]
2024-11-19T01:38:33.170907+00:00
1,559,699,051,000
51af30a542366af84bbe53ff74b164ec1a9ce391
3
{ "blob_id": "51af30a542366af84bbe53ff74b164ec1a9ce391", "branch_name": "refs/heads/master", "committer_date": 1559699051000, "content_id": "3237abc59ab4b6d9d494de3b7a533bae453bb5dd", "detected_licenses": [ "MIT" ], "directory_id": "2be3ce6c98b762eb633b1cdb813eb3323b448dd8", "extension": "py", "fi...
2.578125
stackv2
#Name:PRADEEP RAVICHANDRAN #CSE 6331-Cloud Computing import os from flask import Flask, render_template, request import sqlite3 as sql import pandas as pd import random import time import redis import sqlite3, csv, base64 application = Flask(__name__) con=sqlite3.connect('eq.db') #creating cursor to perform database...
176
29.74
108
16
1,287
python
[{"finding_id": "codeql_py/flask-debug_eb81f241300584a4_4ec3e3c9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 175, 45 ]
[ null, null ]
[ 5, 20 ]
[ 32, 30 ]
2024-11-19T01:38:39.982446+00:00
1,538,555,542,000
bdfa5bcf915c108124961a3f1a8e3042a05b48a2
3
{ "blob_id": "bdfa5bcf915c108124961a3f1a8e3042a05b48a2", "branch_name": "refs/heads/master", "committer_date": 1538555542000, "content_id": "195db9e73f7e864f5090ed044e36c15ca5ddb2c0", "detected_licenses": [ "MIT" ], "directory_id": "63a09660186533789ffcce770769c2a84d385e61", "extension": "py", "fi...
2.53125
stackv2
import requests import user_agents from flask import Flask from flask import request from flask import jsonify freegeoip_endpoint = 'https://freegeoip.net/' cors_value = '*' app = Flask(__name__) def ua_string_to_dict(ua_string): ua_object = {} ua_object['browser'] = {} ua_object['os'] = {} ua_objec...
102
24.98
66
12
681
python
[{"finding_id": "codeql_py/partial-ssrf_a992b8aae21cf4dc_aa4cbf29", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 62 ]
[ null ]
[ 9 ]
[ 56 ]
2024-11-19T01:39:09.323297+00:00
1,600,269,333,000
59c7305bf30745335759ba575f8dc294f45cadd2
2
{ "blob_id": "59c7305bf30745335759ba575f8dc294f45cadd2", "branch_name": "refs/heads/master", "committer_date": 1600269333000, "content_id": "e02ccf597d4800bb968b7405e80634ceb213d3cb", "detected_licenses": [ "Unlicense" ], "directory_id": "99f5bf878df022fb01655e42e3ddd952ed1f1a18", "extension": "py",...
2.4375
stackv2
# coding: utf-8 t-sz环境登录,py颜色打印 import requests,time url="http://t.oa.quanhoo.com/v2/message/countMsgNumByIsRead?token=97ebe773-25ae-4e31-9506-0ab6eb1cb688177" url1="http://t-sz.oa.quanhoo.com/login/login" #get请求 # r= requests.get(url) # print(r.text) print ('当前时间:'+time.strftime("%Y-%m-%d %H:%M:%S", time.localtime(...
74
30.59
106
17
935
python
[{"finding_id": "codeql_py/request-without-cert-validation_f3e0a6a7fb45c4a2_a1666e04", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 27, 44 ]
[ null, null ]
[ 9, 9 ]
[ 55, 72 ]
2024-11-19T01:52:20.273076+00:00
1,600,010,212,000
71cfdc85af24f268b5035983b5602214baaad858
4
{ "blob_id": "71cfdc85af24f268b5035983b5602214baaad858", "branch_name": "refs/heads/master", "committer_date": 1600010212000, "content_id": "0c63b78bea7dd0d44a27a6c38fc9858435fa44bb", "detected_licenses": [ "MIT" ], "directory_id": "f5119813068b61ccea08a24962570a2f5e9cb87f", "extension": "py", "fi...
4.3125
stackv2
#!/usr/bin/python3 while True : password = input("Make up a secure password: ") print("You entered: ", password) # initialize has_capital = False has_digit = False # check length gt_6 = len(password) >= 6 if gt_6 is True : print("Password length check passed") # check alp...
41
26.24
80
10
273
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_04c4739bd8f1b399_46058e0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 5 ]
[ null ]
[ 28 ]
[ 36 ]
2024-11-19T02:28:26.129263+00:00
1,650,992,645,000
443e865ab8b7fda06613577f285e73591a492a5b
2
{ "blob_id": "443e865ab8b7fda06613577f285e73591a492a5b", "branch_name": "refs/heads/master", "committer_date": 1650992645000, "content_id": "b0df38f9a2d7234be899a7e086d488ae90ccb34a", "detected_licenses": [], "directory_id": "0552af3d6eeda99844473b453a3eecc82dcc60da", "extension": "py", "filename": "uni...
2.484375
stackv2
import SPARQLWrapper, logging from biolink import NAME, VERSION from ontobio.util.user_agent import get_user_agent USER_AGENT = get_user_agent(name=NAME, version=VERSION, modules=[SPARQLWrapper], caller_name=__name__) sparql = SPARQLWrapper.SPARQLWrapper("http://sparql.uniprot.org/sparql", agent=USER_AGENT) class Pr...
103
28.18
109
15
852
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ab933d5f007ed33f_0c5abf74", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://www.wikidata.org](1) may be at an arbitrary pos...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [http://www.wikidata.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 56 ]
[ null ]
[ 8 ]
[ 48 ]
2024-11-19T02:37:04.571655+00:00
1,521,404,087,000
2ffc148b8bd08c44c5171ff30a57f73891534eb1
3
{ "blob_id": "2ffc148b8bd08c44c5171ff30a57f73891534eb1", "branch_name": "refs/heads/master", "committer_date": 1521404087000, "content_id": "5c341ca8611312e9c2a18135243da8054ea7ea07", "detected_licenses": [ "Unlicense" ], "directory_id": "8f5ec2f1ebeec6792d9e5d65eed0f7a5fb26142f", "extension": "py",...
2.796875
stackv2
#!/usr/bin/python # Modules import json from modules import * from flasgger import Swagger from flasgger.utils import swag_from from flask import Flask, request, jsonify # Create flask object app = Flask(__name__) Swagger(app) @app.route("/list", methods=["GET"]) @swag_from('./specs/list.yml') def listPets(): ""...
112
24.69
116
12
664
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_00e985e923f570a3_eab48c5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 89, 89 ]
[ null, null ]
[ 25, 42 ]
[ 31, 50 ]
2024-11-19T02:37:07.586351+00:00
1,692,578,976,000
f46cd5f604647fe7de22278ceacfea8a0736541a
2
{ "blob_id": "f46cd5f604647fe7de22278ceacfea8a0736541a", "branch_name": "refs/heads/main", "committer_date": 1692578976000, "content_id": "0390dee950798be1128a3a8c0539fa616279f3d7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2dd26e031162e75f37ecb1f7dd7f675eeb634c63", "extension": "py", ...
2.40625
stackv2
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by appli...
172
32.91
109
20
1,317
python
[{"finding_id": "codeql_py/tarslip_1c08614e3a090714_37d5feec", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 92 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T02:37:08.788216+00:00
1,478,958,292,000
422c86387fc9eb1c09f89b7225088fbb9605780d
2
{ "blob_id": "422c86387fc9eb1c09f89b7225088fbb9605780d", "branch_name": "refs/heads/master", "committer_date": 1478958292000, "content_id": "53de328c6dd036162b93ffac46c8eb1fc20fa6f8", "detected_licenses": [ "MIT" ], "directory_id": "6e1a70888fac97b5c9cab25f72cc2c5009efe704", "extension": "py", "fi...
2.375
stackv2
import base64 import getpass import re import socket import sys import quopri from conf import * import logging import email CRLF = '\r\n' TERMINATOR = CRLF + '.' + CRLF # Searches for a particular Tag in raw message def decode(input_str): result = '' search_result = re.search('=\?([^\?]*)\?([^\?]*)\?([^\?]*)\?=', ...
177
29.28
116
17
1,550
python
[{"finding_id": "codeql_py/redos_bffcbaf180eaa680_271c0550", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'from:\\n ' and containing many re...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'from:\\n ' and containing many repetitions of 'a\\n '." ]
[ 82 ]
[ null ]
[ 42 ]
[ 44 ]
2024-11-19T02:37:16.861414+00:00
1,540,139,026,000
606df06e724646fdb6a6cea9ad5f69909cb4206c
2
{ "blob_id": "606df06e724646fdb6a6cea9ad5f69909cb4206c", "branch_name": "refs/heads/master", "committer_date": 1540139026000, "content_id": "bffd613fc009fd7b5e70a8f8fcb46b1181223250", "detected_licenses": [ "MIT" ], "directory_id": "69123ccc0e1f5b9a853dfda44fc48d6d94318159", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf-8 -*- # Copyright © 2011-2013 Binet Réseau # See the LICENCE file for more informations # This file is a part of Kaoz, a free irc notifier import logging import sys import threading import traceback if sys.version_info < (3,): import SocketServer as socketserver else: import socketserver t...
143
31.03
74
19
980
python
[{"finding_id": "codeql_py/insecure-default-protocol_7ae00ca8c66d7ad1_1b9f613f", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 33 ]
[ 38 ]
[ 34 ]
[ 50 ]
2024-11-19T02:37:30.268344+00:00
1,612,374,525,000
b27b3f6c12993deb7fa749504d30a61dbb5836c0
2
{ "blob_id": "b27b3f6c12993deb7fa749504d30a61dbb5836c0", "branch_name": "refs/heads/master", "committer_date": 1612374525000, "content_id": "04f3f2977d5474728c9e656a02baaff254f60b5c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1278d2524fe6c1452ebadc960b2ac6f5b8340f5f", "extension": "py"...
2.390625
stackv2
# -*- coding: utf-8 -*- """ Created on Wed Feb 3 16:19:57 2021 @author: Administrator """ #!/usr/bin/env python # -*- coding: utf-8 -*- # vim: filetype=python #if wallstreetbets can move the market #why not join em? #fuck investment banks and hedge funds #they only make the rich richer #this script scrapes the top...
292
34.36
109
16
2,522
python
[{"finding_id": "codeql_py/request-without-cert-validation_bbae7b396578d9c6_f7b41212", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 119 ]
[ null ]
[ 18 ]
[ 47 ]
2024-11-19T02:37:46.895446+00:00
1,505,691,349,000
e4ae4360924eae832f965b9f0e49ffea49020ef3
3
{ "blob_id": "e4ae4360924eae832f965b9f0e49ffea49020ef3", "branch_name": "refs/heads/master", "committer_date": 1505691349000, "content_id": "1792ecc3860607f5c7071c959a5c6dafa4bb20e5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1f22a882d86281f1fc18f10e8643a93e4e2cdeeb", "extension": "p...
2.71875
stackv2
from jinja2 import Template from enum import Enum class Type(Enum): UINT = 0 INT = 1 CHARP = 2 FILEP = 3 VOIDP = 4 SIZET = 5 def c_type(self): if self.value == Type.UINT.value: return 'unsigned int' elif self.value == Type.INT.value: return 'int' elif self.value == ...
93
32.24
75
15
771
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_565cccdb65daf480_aba545b8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 70 ]
[ null ]
[ 13 ]
[ 31 ]
2024-11-19T02:49:19.704377+00:00
1,519,138,445,000
20c32b24f73f8e8566b4b639b3885092f5464bd7
2
{ "blob_id": "20c32b24f73f8e8566b4b639b3885092f5464bd7", "branch_name": "refs/heads/master", "committer_date": 1519138445000, "content_id": "4fbff4e992646b27d08b67ac5b3c6a108dcd08fa", "detected_licenses": [ "MIT" ], "directory_id": "35f318af7e3f0f1419e2ec6b25db7fd864098324", "extension": "py", "fi...
2.46875
stackv2
#! /usr/bin/env python3 # -*- coding: utf-8 -*- ''' * __ __ * ____ / /_ ____ ___ __ __ ____ ____ ____ / / * / __ \/ __ \ / __ `__ \/ / / / / __ \/ __ \/ __ \ / / * / /_/ / / / / / / / / / / /_/ / / /_/ / /_/ / /_/ / /_/ * \____/_/...
100
31.79
101
18
891
python
[{"finding_id": "codeql_py/url-redirection_7c721cf1102f03ee_83cfbf09", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 51 ]
[ null ]
[ 33 ]
[ 57 ]
2024-11-19T02:49:22.609384+00:00
1,603,728,795,000
67bfe65d963e65dc202141dec2d6ca3d52719bbb
3
{ "blob_id": "67bfe65d963e65dc202141dec2d6ca3d52719bbb", "branch_name": "refs/heads/master", "committer_date": 1603728795000, "content_id": "b5651942b9ad93952f5633d119c0d1c25ebbf23b", "detected_licenses": [ "MIT" ], "directory_id": "ad51c409de320a2048b42d1b50871aae741c9c50", "extension": "py", "fi...
3.234375
stackv2
#!/usr/bin/env python """Extend Python's built in HTTP server to save files curl or wget can be used to send files with options similar to the following curl -X PUT --upload-file somefile.txt http://localhost:8000 wget -O- --method=PUT --body-file=somefile.txt http://localhost:8000/somefile.txt __Note__: curl a...
36
35.06
93
14
321
python
[{"finding_id": "codeql_py/path-injection_3239b1301f6e0012_50b010f0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 28 ]
[ null ]
[ 19 ]
[ 27 ]
2024-11-19T02:49:23.022486+00:00
1,466,781,446,000
bc893ba87f331c17a4dbae6a229c556026b500d8
3
{ "blob_id": "bc893ba87f331c17a4dbae6a229c556026b500d8", "branch_name": "refs/heads/master", "committer_date": 1466781446000, "content_id": "8855419b32fac83b93b20ed6f8444feb75e5d666", "detected_licenses": [ "MIT" ], "directory_id": "66ac80dfd32a366d430c0a2c104f3b5726106a5f", "extension": "py", "fi...
2.6875
stackv2
import sys from jinja2 import Template def gen_mask(end): mask = 0 for j in range(16): # current bit is 0 indicating passive nibble if end % 2 == 0: mask |= 15 << (4*j) end >>= 1 return '{0:#x}'.format(mask) def gen_logic(diff): lines = [] for i in range(16): ...
227
30.04
105
15
2,254
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1883fd45cfc16284_5c10a5cd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 210 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-19T02:49:27.380667+00:00
1,531,504,796,000
3744baafce6931542a7cffaaba4e54ec38bc44a3
2
{ "blob_id": "3744baafce6931542a7cffaaba4e54ec38bc44a3", "branch_name": "refs/heads/master", "committer_date": 1531504796000, "content_id": "412d5e4c9be7b62ed26632e7922f8033cfae5af5", "detected_licenses": [ "MIT" ], "directory_id": "546419d74535096182dcdf2cf40b9969c287389a", "extension": "py", "fi...
2.34375
stackv2
#!usr/bin/env python ################################################################## # setup.py # # description: for running the web server honeypot # # author: @shipcod3 # # greetz: ROOTCON goons and ba...
61
31.85
80
15
437
python
[{"finding_id": "codeql_py/log-injection_da52bc9667a14e85_e5ff48d2", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 27, 31 ]
[ null, null ]
[ 22, 22 ]
[ 34, 34 ]
2024-11-19T02:49:44.833324+00:00
1,377,942,297,000
489ec87a072b023318140601689561e7dfb2565c
3
{ "blob_id": "489ec87a072b023318140601689561e7dfb2565c", "branch_name": "refs/heads/master", "committer_date": 1377942297000, "content_id": "66b914350bf831efe6034d2057d502a7a3cc53dc", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "ba6225619b05e42ae6fe4905248b859dfbbc400f", "extension": "p...
2.828125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ cookiecutter.generate --------------------- Functions for generating a project from a project template. """ from __future__ import unicode_literals import logging import os import shutil import sys from jinja2 import FileSystemLoader, Template from jinja2.environment...
135
30.57
81
14
952
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3172e10f18998016_90ecedc6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially...
[ 65, 89, 113, 127 ]
[ null, null, null, null ]
[ 19, 21, 17, 25 ]
[ 69, 38, 39, 41 ]
2024-11-19T03:00:12.364251+00:00
1,632,236,428,000
064a922c91aa147ac688590b642b7b8e5e316273
3
{ "blob_id": "064a922c91aa147ac688590b642b7b8e5e316273", "branch_name": "refs/heads/main", "committer_date": 1632236428000, "content_id": "a938de407d8bab8cce66fc8b842256f02271a011", "detected_licenses": [ "MIT" ], "directory_id": "e93c6e93f612bca7f192adf539b4f489ad114ab5", "extension": "py", "file...
3.0625
stackv2
import itertools from time import time, sleep import argparse from multiprocessing import Process, Queue import psutil import sys parser = argparse.ArgumentParser(description="brute force password crack") parser.add_argument("-P", "--processes", default=psutil.cpu_count(), help="Number of processes to use") parser.add...
119
32.39
111
18
883
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1b9cb3dda18adcb3_42aade24", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 101 ]
[ null ]
[ 19 ]
[ 57 ]
2024-11-19T03:00:14.477228+00:00
1,670,266,661,000
7576f57e9e2e74f3ef50d9d9214062f865f3e3d2
3
{ "blob_id": "7576f57e9e2e74f3ef50d9d9214062f865f3e3d2", "branch_name": "refs/heads/master", "committer_date": 1670266661000, "content_id": "5c40b73b08e69431e7222bc7082641cd03402b05", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "ebb4c52fd5e86681465917410a8afcf0f695eb5c", "ext...
2.953125
stackv2
from jupyterhub.auth import Authenticator import hashlib from traitlets import Dict class DictionaryAuthenticator(Authenticator): encrypted_passwords = Dict(config=True, help="""dict of username -> {digest -> hashval, salt -> saltval} for authentication with SHA512""" ) async def authenticate(sel...
23
40.61
106
16
203
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6c557cc357fc75c2_c21c9f5a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 20 ]
[ null ]
[ 37 ]
[ 52 ]
2024-11-19T03:00:27.805181+00:00
1,530,242,296,000
d01beae606cb11849fa524540b82e41fca5850a4
3
{ "blob_id": "d01beae606cb11849fa524540b82e41fca5850a4", "branch_name": "refs/heads/master", "committer_date": 1530242296000, "content_id": "0e8a46e94e2c9e87e6c649b9a43d8c294d2b1a0c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d605b187d3d22ca5dabf0fd9eb1613417f71161e", "extension": "py"...
3.28125
stackv2
from urllib import request from urllib import parse # textPage = request.urlopen("https://fengshenfeilian.github.io/") # print(str(textPage.read(),'utf-8')) # headers = { # 'X-Bmob-Application-Id': "43199c324d3bcb01bacdbd0914277ef0", # "X-Bmob-REST-API-Key": "d4ac4f967651b0a0053a9d3c45c3efa8" # } # params =...
115
18.39
66
12
745
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0df5dd32f6971340_1b3653e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 49, 54 ]
[ null, null ]
[ 7, 7 ]
[ 14, 15 ]
2024-11-19T03:12:01.374428+00:00
1,628,177,393,000
e04a8cba278f445a7e3ed95ce277a0dedf66991d
2
{ "blob_id": "e04a8cba278f445a7e3ed95ce277a0dedf66991d", "branch_name": "refs/heads/master", "committer_date": 1628177393000, "content_id": "2839438fb61a9859c271f11568f27e5889b4afb4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "825035ad37f8baf4cfd3057afa93a306523644c5", "extension": "p...
2.421875
stackv2
# -*- coding: utf-8 -*- """ users.py :copyright: (c) 2014 by Aravinda VK :license: MIT, see LICENSE for more details. """ import sqlite3 from glusterfsrest.config import USERS_DB import hashlib conn = None cursor = None def pwdhash(inp): return hashlib.sha512(inp.encode("utf-8")).hexdigest() def...
140
21.35
70
12
748
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d9eb2cd51de6eee1_25724d69", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 19 ]
[ null ]
[ 27 ]
[ 46 ]
2024-11-19T03:12:06.757562+00:00
1,624,717,874,000
a1e557aa3bf2ec11cb9c4ba41db02006060d4715
3
{ "blob_id": "a1e557aa3bf2ec11cb9c4ba41db02006060d4715", "branch_name": "refs/heads/master", "committer_date": 1624717874000, "content_id": "5abd19e1354632f1e30ed6ce700cbe973b642a2d", "detected_licenses": [ "MIT" ], "directory_id": "7485d64206f3928d8e54877f7b94353dd23db903", "extension": "py", "fi...
2.59375
stackv2
import requests import argparse import yaml import json import os import sys from urllib3.exceptions import InsecureRequestWarning from url_normalize import url_normalize requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning) DEFAULT_SETTINGS_NAME = "settings.yml" def populate_with_args(parser)...
116
36.63
112
15
944
python
[{"finding_id": "codeql_py/request-without-cert-validation_592c3d34db356982_94e05e09", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 59, 77, 93 ]
[ 62, 81, 97 ]
[ 16, 16, 16 ]
[ 42, 43, 43 ]
2024-11-19T03:12:08.760581+00:00
1,618,937,398,000
ac00c7491d3ddf0477afcf3f965a074413cbe480
3
{ "blob_id": "ac00c7491d3ddf0477afcf3f965a074413cbe480", "branch_name": "refs/heads/master", "committer_date": 1618937398000, "content_id": "a1a687165563ca06a8f183d6f4ff1f063ef0121e", "detected_licenses": [ "MIT" ], "directory_id": "4404810143d96aa4ab08675ad7efdaf2abe1576e", "extension": "py", "fi...
2.53125
stackv2
# # Auth module: users, groups and menu # """ MIT License Copyright (c) 2017 Ioan Coman Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the ri...
210
32.49
91
14
1,661
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_03e07cdc671b634f_3dad14df", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 94, 100 ]
[ null, null ]
[ 28, 21 ]
[ 91, 80 ]
2024-11-19T03:12:40.800387+00:00
1,539,137,971,000
99a9620ba7676054bbb3700d3fc9e6dd29c2bfff
3
{ "blob_id": "99a9620ba7676054bbb3700d3fc9e6dd29c2bfff", "branch_name": "refs/heads/master", "committer_date": 1539137971000, "content_id": "0a796ad49bdff691b249094e548bd0772db2a405", "detected_licenses": [ "MIT" ], "directory_id": "1f2f180fca5d8345e887eee3252a728ab7cee2e8", "extension": "py", "fi...
2.546875
stackv2
# FLASK FEEDBACK PROJECT from flask import Flask, request, redirect, render_template, session, flash from flask_debugtoolbar import DebugToolbarExtension from sqlalchemy.exc import IntegrityError from models import db, connect_db, User, Feedback from formclasses import RegisterForm, LoginForm, FeedbackForm from secret...
202
25.45
99
15
1,104
python
[{"finding_id": "codeql_py/url-redirection_87067b59961f33da_94e60ecb", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 156, 177, 199 ]
[ null, null, null ]
[ 25, 25, 25 ]
[ 45, 45, 45 ]
2024-11-19T03:12:52.238131+00:00
1,563,017,828,000
d3f209e18e3ce27bec6d7136165b7175054a7ad3
2
{ "blob_id": "d3f209e18e3ce27bec6d7136165b7175054a7ad3", "branch_name": "refs/heads/master", "committer_date": 1563017828000, "content_id": "4f00fe1fd2a835b5017c585f94225afac8c416a4", "detected_licenses": [ "MIT" ], "directory_id": "e0c5e4837284b9a02c53ffd68443d1d50a803086", "extension": "py", "fi...
2.5
stackv2
# -*- coding: utf-8 -*- import os import win32crypt import sqlite3 SaveFileName = r"pwd.txt" def Extract(): chrome_path = r"Google\Chrome\User Data\Default\Login Data" file_path = os.path.join(os.environ['LOCALAPPDATA'], chrome_path) if not os.path.exists(file_path): return conn = sqlite3.co...
28
29.79
85
15
222
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5f17308d0e460f93_1d628423", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 23 ]
[ null ]
[ 21 ]
[ 48 ]
2024-11-19T03:35:44.962185+00:00
1,610,825,543,000
275fa90c4f1d1c7449c2da8fcdbf74d5955ca5fb
3
{ "blob_id": "275fa90c4f1d1c7449c2da8fcdbf74d5955ca5fb", "branch_name": "refs/heads/master", "committer_date": 1610825543000, "content_id": "9c81350901119b252e5247be5dd3ec1bb16d5783", "detected_licenses": [ "MIT" ], "directory_id": "88aac255460f2bce0bc7b2c61b342485f6b98dd6", "extension": "py", "fi...
2.875
stackv2
from jinja2 import Environment, FileSystemLoader import json import re from parser import * import urllib import urlparse class DocGenerator: """ Generate a markdown document with info on APIs from postman exported file using jinja """ _api_template = 'api_template.md' _group_template = 'group_template.m...
97
38.87
110
17
829
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_48773d4620e94e85_5bd2515d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ null ]
[ 15 ]
[ 46 ]
2024-11-19T03:35:45.071994+00:00
1,560,747,169,000
4cde6498a1648dcc1fd468293dbffb713d641373
3
{ "blob_id": "4cde6498a1648dcc1fd468293dbffb713d641373", "branch_name": "refs/heads/master", "committer_date": 1560747169000, "content_id": "0a820f5c68bb872bd3c2ec03c681c08fb8935752", "detected_licenses": [ "MIT" ], "directory_id": "629084b4ef5c2b2930255ce23cddb9147a29a386", "extension": "py", "fi...
2.84375
stackv2
#File: client.py #Author: Kripash Shrestha #Project: Lab 2 import sys import socket import uuid import hashlib import random import time #grab host name to get ip of device USER_ID = sys.argv[1] SERVER_IP = sys.argv[2] UDP_PORT = int(sys.argv[3]) hostname = socket.gethostname() #Function: getClientIP #Gets the IP of...
270
38.62
152
20
2,691
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0d9343adc585caf1_ae1728f7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
4
true
[ "CWE-312", "CWE-312", "CWE-327", "CWE-200" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/weak-sensitive-data-hashing", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensiti...
[ 90, 254, 172, 47 ]
[ null, null, null, null ]
[ 22, 16, 27, 5 ]
[ 41, 32, 39, 28 ]
2024-11-19T01:29:21.826765+00:00
1,613,845,283,000
cb52cbdfc2960906b6916da6cf3d5c658cdece02
3
{ "blob_id": "cb52cbdfc2960906b6916da6cf3d5c658cdece02", "branch_name": "refs/heads/master", "committer_date": 1613845283000, "content_id": "e256e06e777189767abba297d4b9584aa15fa639", "detected_licenses": [ "MIT" ], "directory_id": "ee7bea34900eaf51e2e4b062e6e975fbae690716", "extension": "py", "fi...
2.78125
stackv2
import os, json def getHeartRate(): mapping = {} heartRateFiles = [i for i in os.listdir('data/user-site-export/HR/') if i.endswith("json")] for file in heartRateFiles: dateArr = [] ; bpmArr = [] fileName = str(file) date = fileName[11:-5] pathToFile = 'data/user-site-export/HR/' + fileName with open(pathT...
20
28.95
92
16
167
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f8f3a4f1543b0f82_b50813aa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 20 ]
[ null ]
[ 7 ]
[ 14 ]
2024-11-19T01:29:28.569047+00:00
1,502,718,757,000
897797bfa2ddfbb8eb834483f7d84a3488f6e412
2
{ "blob_id": "897797bfa2ddfbb8eb834483f7d84a3488f6e412", "branch_name": "refs/heads/master", "committer_date": 1502718757000, "content_id": "e5849be6c8f5294a8396886c444439c2436acde1", "detected_licenses": [ "MIT" ], "directory_id": "27563c648f73d28279667d97bd37da9366f0b347", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf-8 -*- from __future__ import absolute_import from __future__ import print_function from six.moves import input import getpass import solvebio from ..client import client, SolveError from .credentials import ( get_credentials, delete_credentials, save_credentials ) def _print_msg(msg): ...
127
25.91
68
15
781
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c0448f44e35bd95e_48c0b473", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 11 ]
[ 20 ]
2024-11-19T01:29:57.132141+00:00
1,505,576,788,000
37f2e5313c56d3307975fb749cb7d93e446450b0
3
{ "blob_id": "37f2e5313c56d3307975fb749cb7d93e446450b0", "branch_name": "refs/heads/master", "committer_date": 1505576788000, "content_id": "223e14b867124045e8635d73a8ad3c8c90671ec1", "detected_licenses": [ "MIT" ], "directory_id": "a9c1596a686942e0128f795e21c67d13eb5529c4", "extension": "py", "fi...
2.875
stackv2
# -*- coding: utf-8 -*- # File: myutils.py # Author: Rafał Nowak <rafal.nowak@cs.uni.wroc.pl> import os import logging import tarfile import urllib.request import pickle import numpy as np # pylint: CIFAR_DATA_URL = 'http://www.cs.toronto.edu/~kriz/cifar-10-python.tar.gz' CIFAR_DIR_PATH = './cifar10_data/' CIFAR_FOL...
114
38.25
115
18
1,185
python
[{"finding_id": "codeql_py/tarslip_3b603484116e8594_5cd9c2ef", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 98 ]
[ null ]
[ 9 ]
[ 39 ]
2024-11-19T01:30:05.553226+00:00
1,492,437,253,000
eec1660d281db4e39a0b2193752332308ad312d9
3
{ "blob_id": "eec1660d281db4e39a0b2193752332308ad312d9", "branch_name": "refs/heads/master", "committer_date": 1492437253000, "content_id": "d7650cb710452cda04d08aa7a1c406e171674a23", "detected_licenses": [ "MIT" ], "directory_id": "85f6694698cee7dbbefa5c292a8aa1934bf95ff1", "extension": "py", "fi...
2.515625
stackv2
from flask import Flask, jsonify, request from flask_cors import CORS import json import rdflib import requests import xml.etree.ElementTree as ET import lxml.etree as LET from StringIO import StringIO from io import BytesIO from utils import oai_root_path app = Flask(__name__) CORS(app) def get_rdf(article_id): ...
71
24.75
147
13
487
python
[{"finding_id": "codeql_py/flask-debug_c31f863b5549b06b_25307442", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-776", "CWE-918" ]
[ "py/flask-debug", "py/xml-bomb", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion.\nXML parsing depends on a [user-provided value](2) without guarding against uncontrolled...
[ 70, 19, 17 ]
[ null, null, null ]
[ 5, 26, 9 ]
[ 24, 48, 148 ]
2024-11-19T01:30:10.422116+00:00
1,618,218,305,000
c905f8032ce07a92d7b871b8dc3cd581e4edae4f
3
{ "blob_id": "c905f8032ce07a92d7b871b8dc3cd581e4edae4f", "branch_name": "refs/heads/main", "committer_date": 1618218305000, "content_id": "995111a06096e226be0abaf890c52fb753923be8", "detected_licenses": [ "MIT" ], "directory_id": "ae84637a80c1a21af3de3f9f5ac83927fcfdd705", "extension": "py", "file...
2.71875
stackv2
import re from rest_framework import serializers from api.models import Message class MessageSerializer(serializers.ModelSerializer): class Meta: model = Message fields = '__all__' def validate_author(self, value): regex = '^(\w|\.|\_|\-)+[@](\w|\_|\-|\.)+[.]\w{2,3}$' if re.se...
23
28.17
70
12
156
python
[{"finding_id": "codeql_py/redos_d648151dbf948e05_09ae7d3b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'." ]
[ 11, 11 ]
[ null, null ]
[ 19, 36 ]
[ 33, 50 ]
2024-11-19T01:30:24.878135+00:00
1,680,317,156,000
a8cf0017f1c83b7f1bfa75ec17ba5b5e9ea52846
3
{ "blob_id": "a8cf0017f1c83b7f1bfa75ec17ba5b5e9ea52846", "branch_name": "refs/heads/master", "committer_date": 1680317156000, "content_id": "fa02be1d889e559dd96807cb612771a059df3332", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8e2e28a191fa5ec5a6c070ec7e9ccad98c8b4a0b", "extension": "py"...
2.78125
stackv2
#/usr/bin/env python #coding=utf8 """ # Author: kellanfan # Created Time : Fri 29 Jun 2018 10:56:30 AM CST # File Name: userlogin.py # Description: """ import sys import hashlib sys.path.append('/root/python/spider/misc') import mysql_connect import redishelper def hash_pass(passwd): hash = hashlib.sha1() h...
78
23.08
82
16
521
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bdb77c65b0e5ca86_9e7f1ca3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 20 ]
[ null ]
[ 17 ]
[ 39 ]
2024-11-19T01:30:25.576082+00:00
1,603,851,780,000
105958249b8c85628e91664fc37e16b74004eb61
3
{ "blob_id": "105958249b8c85628e91664fc37e16b74004eb61", "branch_name": "refs/heads/main", "committer_date": 1603851780000, "content_id": "7a6ec5384445daf838e3bb4d71bf6286773b656f", "detected_licenses": [ "MIT" ], "directory_id": "d63f92f0d587128c13bd22237c0952de7046fd0d", "extension": "py", "file...
2.578125
stackv2
from collections import namedtuple import os import random from typing import Set import boto3 import jinja2 import pocket Recipe = namedtuple("Recipe", ["title", "url", "img"]) def _get_param(name: str) -> str: """Get a parameter from AWS Parameter store.""" ssm = boto3.client("ssm") param = ssm.get_p...
67
25.73
84
15
425
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d9c3bd29a0a670db_3defc6c6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 43 ]
[ null ]
[ 11 ]
[ 74 ]
2024-11-19T01:30:26.104431+00:00
1,637,477,487,000
81c45302db09a108d3defd562231f33a159da574
3
{ "blob_id": "81c45302db09a108d3defd562231f33a159da574", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "56aef522c69e5713e53bbb64b1c921ba411c4376", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.546875
stackv2
import os import time import uuid from flask import Flask, request, make_response, render_template, redirect from google.cloud import storage from peewee import * db = SqliteDatabase("core.db") class User(Model): # mapping from user token to their background pic url id = AutoField() token = CharField() ...
83
35.49
121
17
762
python
[{"finding_id": "codeql_py/cookie-injection_36c5d2029ea15e07_1dcfac7a", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-020", "CWE-215" ]
[ "py/cookie-injection", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 51, 83 ]
[ null, null ]
[ 30, 5 ]
[ 35, 53 ]
2024-11-19T01:30:36.313346+00:00
1,620,055,036,000
df804c630e8fce6989f213e067fca76c636ca695
3
{ "blob_id": "df804c630e8fce6989f213e067fca76c636ca695", "branch_name": "refs/heads/main", "committer_date": 1620055036000, "content_id": "2ad444d57029d5da58e5c3af0d7da6fb09c16bb7", "detected_licenses": [ "MIT" ], "directory_id": "628ef23809589f6bff6e8591fbba3341bcb5d32d", "extension": "py", "file...
2.71875
stackv2
import os parentPath = os.path.abspath(os.path.join(os.getcwd(), os.pardir)) desiredPath = "\\AdventOfCode2020\\solutions\\dag2\\dag2input.txt" passwordList = open(parentPath + desiredPath).readlines() trash = [i.split(' ')[1] for i in passwordList] characterRange = [i.split(' ')[0] for i in passwordList] maxRang...
49
25.29
110
10
340
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3e4701747a246976_ff60232a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 49 ]
[ null ]
[ 7 ]
[ 21 ]
2024-11-19T01:54:57.981627+00:00
1,622,204,169,000
6691b8b0fe2dd7f01419e4b60d6c8916659d2334
2
{ "blob_id": "6691b8b0fe2dd7f01419e4b60d6c8916659d2334", "branch_name": "refs/heads/master", "committer_date": 1622204169000, "content_id": "2e84808f17d08142b57c3fc5aeb5109b835348ab", "detected_licenses": [ "MIT" ], "directory_id": "db53c46cb8abb44fb9d545883ed1c70095f7c0fe", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Date of establishment: November 27, 2018 @author: zhangzd """ import cv2 import requests import json import threading import time import base64 import numpy as np from PIL import Image, ImageDraw, ImageFont from aip import AipSpeech import pygame from requests.packag...
147
28.04
101
22
1,127
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_261f835806c5be1a_7e7f9ecd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 123 ]
[ null ]
[ 19 ]
[ 25 ]
2024-11-19T01:55:01.219236+00:00
1,585,657,131,000
3de679151591f211fffd33c344ed7335cfae3f14
2
{ "blob_id": "3de679151591f211fffd33c344ed7335cfae3f14", "branch_name": "refs/heads/master", "committer_date": 1585657131000, "content_id": "b7dfa49c85bfb3c402f6a966ce46d040dfc275f6", "detected_licenses": [ "MIT" ], "directory_id": "6621e50390a9c963f2299d2d6c1a530ee92c4a3b", "extension": "py", "fi...
2.40625
stackv2
#! Copyright (C) 2017 Christian Stransky #! #! This software may be modified and distributed under the terms #! of the MIT license. See the LICENSE file for details. from flask import Flask, redirect, request, make_response from shutil import copyfile import json import requests import os.path import uuid import urll...
48
32.9
109
14
398
python
[{"finding_id": "codeql_py/insecure-cookie_c501d0e6cbe50394_9f04e33a", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
4
true
[ "CWE-614", "CWE-020", "CWE-020", "CWE-1004" ]
[ "py/insecure-cookie", "py/cookie-injection", "py/cookie-injection", "py/client-exposed-cookie" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Cookie is constructed from a [user-supplied input](1).", "Cookie is constructed from a [user-supplied input](1).", "Sensitive server cookie is set without HttpOnly flag." ]
[ 36, 36, 37, 36 ]
[ null, null, null, null ]
[ 5, 35, 34, 5 ]
[ 43, 42, 39, 43 ]
2024-11-19T01:55:02.215239+00:00
1,431,544,144,000
859b6431c16f361fafe7ae5f34249a2553af0e16
3
{ "blob_id": "859b6431c16f361fafe7ae5f34249a2553af0e16", "branch_name": "refs/heads/master", "committer_date": 1431544144000, "content_id": "ef204b68e606d91d32c1cef977d836e6efe21e31", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1ea679d61ab8a48ddb98e11748b343e966774496", "extension": "py"...
2.640625
stackv2
#!/usr/bin/env python # Copyright 2010 Google Inc. All Rights Reserved. """Java-related scrubbers.""" __author__ = 'dbentley@google.com (Dan Bentley)' import re from moe.scrubber import base from moe.scrubber import comment_scrubber # A file is unmeaningful if it contains only package declarations, import # declar...
240
33.93
80
20
2,006
python
[{"finding_id": "codeql_py/redos_5b80100a34ada6bc_91942ade", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'package' and containing many repe...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'package' and containing many repetitions of ';package'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'import' and containing many repetitions of ';import'." ]
[ 15, 15 ]
[ null, null ]
[ 49, 60 ]
[ 52, 63 ]