{ "cwe": "CWE-020", "query_name": "Frequency counts for external APIs that are used with untrusted data", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-020-ExternalAPIs/ExternalAPIsUsedWithUntrustedData.ql" } { "cwe": "CWE-020", "query_name": "Untrusted data passed to external API", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-020-ExternalAPIs/UntrustedDataToExternalAPI.ql" } { "cwe": "CWE-020", "query_name": "Incomplete regular expression for hostnames", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-020/IncompleteHostnameRegExp.ql" } { "cwe": "CWE-020", "query_name": "Incomplete URL substring sanitization", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-020/IncompleteUrlSubstringSanitization.ql" } { "cwe": "CWE-020", "query_name": "Overly permissive regular expression range", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-020/OverlyLargeRange.ql" } { "cwe": "CWE-022", "query_name": "Uncontrolled data used in path expression", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-022/PathInjection.ql" } { "cwe": "CWE-022", "query_name": "Arbitrary file write during tarfile extraction", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-022/TarSlip.ql" } { "cwe": "CWE-078", "query_name": "Uncontrolled command line", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-078/CommandInjection.ql" } { "cwe": "CWE-079", "query_name": "Jinja2 templating with autoescape=False", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-079/Jinja2WithoutEscaping.ql" } { "cwe": "CWE-079", "query_name": "Reflected server-side cross-site scripting", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-079/ReflectedXss.ql" } { "cwe": "CWE-089", "query_name": "SQL query built from user-controlled sources", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-089/SqlInjection.ql" } { "cwe": "CWE-090", "query_name": "LDAP query built from user-controlled sources", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-090/LdapInjection.ql" } { "cwe": "CWE-094", "query_name": "Code injection", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-094/CodeInjection.ql" } { "cwe": "CWE-116", "query_name": "Bad HTML filtering regexp", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-116/BadTagFilter.ql" } { "cwe": "CWE-117", "query_name": "Log Injection", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-117/LogInjection.ql" } { "cwe": "CWE-209", "query_name": "Information exposure through an exception", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-209/StackTraceExposure.ql" } { "cwe": "CWE-215", "query_name": "Flask app is run in debug mode", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-215/FlaskDebug.ql" } { "cwe": "CWE-285", "query_name": "PAM authorization bypass due to incorrect usage", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-285/PamAuthorization.ql" } { "cwe": "CWE-295", "query_name": "Accepting unknown SSH host keys when using Paramiko", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-295/MissingHostKeyValidation.ql" } { "cwe": "CWE-295", "query_name": "Request without certificate validation", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-295/RequestWithoutValidation.ql" } { "cwe": "CWE-312", "query_name": "Clear-text logging of sensitive information", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-312/CleartextLogging.ql" } { "cwe": "CWE-312", "query_name": "Clear-text storage of sensitive information", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-312/CleartextStorage.ql" } { "cwe": "CWE-326", "query_name": "Use of weak cryptographic key", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-326/WeakCryptoKey.ql" } { "cwe": "CWE-327", "query_name": "Use of a broken or weak cryptographic algorithm", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-327/BrokenCryptoAlgorithm.ql" } { "cwe": "CWE-327", "query_name": "Default version of SSL/TLS may be insecure", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-327/InsecureDefaultProtocol.ql" } { "cwe": "CWE-327", "query_name": "Use of insecure SSL/TLS version", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-327/InsecureProtocol.ql" } { "cwe": "CWE-327", "query_name": "Use of a broken or weak cryptographic hashing algorithm on sensitive data", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-327/WeakSensitiveDataHashing.ql" } { "cwe": "CWE-352", "query_name": "CSRF protection weakened or disabled", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-352/CSRFProtectionDisabled.ql" } { "cwe": "CWE-377", "query_name": "Insecure temporary file", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-377/InsecureTemporaryFile.ql" } { "cwe": "CWE-502", "query_name": "Deserializing untrusted input", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-502/UnsafeDeserialization.ql" } { "cwe": "CWE-601", "query_name": "URL redirection from remote source", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-601/UrlRedirect.ql" } { "cwe": "CWE-611", "query_name": "XML external entity expansion", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-611/Xxe.ql" } { "cwe": "CWE-643", "query_name": "XPath query built from user-controlled sources", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-643/XpathInjection.ql" } { "cwe": "CWE-730", "query_name": "Polynomial regular expression used on uncontrolled data", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-730/PolynomialReDoS.ql" } { "cwe": "CWE-730", "query_name": "Inefficient regular expression", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-730/ReDoS.ql" } { "cwe": "CWE-730", "query_name": "Regular expression injection", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-730/RegexInjection.ql" } { "cwe": "CWE-732", "query_name": "Overly permissive file permissions", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-732/WeakFilePermissions.ql" } { "cwe": "CWE-776", "query_name": "XML internal entity expansion", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-776/XmlBomb.ql" } { "cwe": "CWE-798", "query_name": "Hard-coded credentials", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-798/HardcodedCredentials.ql" } { "cwe": "CWE-918", "query_name": "Full server-side request forgery", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-918/FullServerSideRequestForgery.ql" } { "cwe": "CWE-918", "query_name": "Partial server-side request forgery", "query_path": "{CODEQL_HOME}/codeql-repo/python/ql/src/Security/CWE-918/PartialServerSideRequestForgery.ql" }