CWE coverage for Python¶
An overview of CWE coverage for Python in the latest release of CodeQL.
Overview¶
CWE | Language | Query id | Query name |
---|---|---|---|
CWE-20 | Python | py/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-20 | Python | py/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-20 | Python | py/cookie-injection | Construction of a cookie using user-supplied input |
CWE-20 | Python | py/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-20 | Python | py/incomplete-url-substring-sanitization | Incomplete URL substring sanitization |
CWE-20 | Python | py/overly-large-range | Overly permissive regular expression range |
CWE-20 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-22 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-22 | Python | py/tarslip | Arbitrary file write during tarfile extraction |
CWE-22 | Python | py/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-22 | Python | py/tarslip-extended | Arbitrary file write during tarfile extraction |
CWE-22 | Python | py/unsafe-unpacking | Arbitrary file write during a tarball extraction from a user controlled source |
CWE-23 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-36 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-73 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-73 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-74 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-74 | Python | py/command-line-injection | Uncontrolled command line |
CWE-74 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-74 | Python | py/jinja2/autoescape-false | Jinja2 templating with autoescape=False |
CWE-74 | Python | py/reflective-xss | Reflected server-side cross-site scripting |
CWE-74 | Python | py/sql-injection | SQL query built from user-controlled sources |
CWE-74 | Python | py/ldap-injection | LDAP query built from user-controlled sources |
CWE-74 | Python | py/code-injection | Code injection |
CWE-74 | Python | py/http-response-splitting | HTTP Response Splitting |
CWE-74 | Python | py/xpath-injection | XPath query built from user-controlled sources |
CWE-74 | Python | py/nosql-injection | NoSQL Injection |
CWE-74 | Python | py/template-injection | Server Side Template Injection |
CWE-74 | Python | py/paramiko-command-injection | Command execution on a secondary remote server |
CWE-74 | Python | py/reflective-xss-email | Reflected server-side cross-site scripting |
CWE-74 | Python | py/xslt-injection | XSLT query built from user-controlled sources |
CWE-74 | Python | py/js2py-rce | JavaScript code execution. |
CWE-77 | Python | py/command-line-injection | Uncontrolled command line |
CWE-77 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-78 | Python | py/command-line-injection | Uncontrolled command line |
CWE-78 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-79 | Python | py/jinja2/autoescape-false | Jinja2 templating with autoescape=False |
CWE-79 | Python | py/reflective-xss | Reflected server-side cross-site scripting |
CWE-79 | Python | py/http-response-splitting | HTTP Response Splitting |
CWE-79 | Python | py/reflective-xss-email | Reflected server-side cross-site scripting |
CWE-88 | Python | py/command-line-injection | Uncontrolled command line |
CWE-88 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-89 | Python | py/sql-injection | SQL query built from user-controlled sources |
CWE-90 | Python | py/ldap-injection | LDAP query built from user-controlled sources |
CWE-91 | Python | py/xpath-injection | XPath query built from user-controlled sources |
CWE-91 | Python | py/xslt-injection | XSLT query built from user-controlled sources |
CWE-93 | Python | py/http-response-splitting | HTTP Response Splitting |
CWE-94 | Python | py/code-injection | Code injection |
CWE-94 | Python | py/js2py-rce | JavaScript code execution. |
CWE-95 | Python | py/code-injection | Code injection |
CWE-99 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-113 | Python | py/http-response-splitting | HTTP Response Splitting |
CWE-116 | Python | py/reflective-xss | Reflected server-side cross-site scripting |
CWE-116 | Python | py/code-injection | Code injection |
CWE-116 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-116 | Python | py/log-injection | Log Injection |
CWE-116 | Python | py/reflective-xss-email | Reflected server-side cross-site scripting |
CWE-117 | Python | py/log-injection | Log Injection |
CWE-172 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-176 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-179 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-180 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-183 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-185 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-186 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-200 | Python | py/bind-socket-all-network-interfaces | Binding a socket to all network interfaces |
CWE-200 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-200 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-200 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-200 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-200 | Python | py/possible-timing-attack-against-hash | Timing attack against Hash |
CWE-200 | Python | py/timing-attack-against-hash | Timing attack against Hash |
CWE-200 | Python | py/timing-attack-against-header-value | Timing attack against header value |
CWE-200 | Python | py/possible-timing-attack-sensitive-info | Timing attack against secret |
CWE-200 | Python | py/timing-attack-sensitive-info | Timing attack against secret |
CWE-203 | Python | py/possible-timing-attack-against-hash | Timing attack against Hash |
CWE-203 | Python | py/timing-attack-against-hash | Timing attack against Hash |
CWE-203 | Python | py/timing-attack-against-header-value | Timing attack against header value |
CWE-203 | Python | py/possible-timing-attack-sensitive-info | Timing attack against secret |
CWE-203 | Python | py/timing-attack-sensitive-info | Timing attack against secret |
CWE-208 | Python | py/possible-timing-attack-against-hash | Timing attack against Hash |
CWE-208 | Python | py/timing-attack-against-hash | Timing attack against Hash |
CWE-208 | Python | py/timing-attack-against-header-value | Timing attack against header value |
CWE-208 | Python | py/possible-timing-attack-sensitive-info | Timing attack against secret |
CWE-208 | Python | py/timing-attack-sensitive-info | Timing attack against secret |
CWE-209 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-215 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-221 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-227 | Python | py/equals-hash-mismatch | Inconsistent equality and hashing |
CWE-227 | Python | py/call/wrong-named-class-argument | Wrong name for an argument in a class instantiation |
CWE-227 | Python | py/call/wrong-number-class-arguments | Wrong number of arguments in a class instantiation |
CWE-227 | Python | py/super-not-enclosing-class | First argument to super() is not enclosing class |
CWE-227 | Python | py/call/wrong-named-argument | Wrong name for an argument in a call |
CWE-227 | Python | py/percent-format/wrong-arguments | Wrong number of arguments for format |
CWE-227 | Python | py/call/wrong-arguments | Wrong number of arguments in a call |
CWE-252 | Python | py/ignored-return-value | Ignored return value |
CWE-259 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-284 | Python | py/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-284 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-284 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-284 | Python | py/flask-constant-secret-key | Initializing SECRET_KEY of Flask application with Constant value |
CWE-284 | Python | py/improper-ldap-auth | Improper LDAP Authentication |
CWE-284 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-284 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-285 | Python | py/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-285 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-287 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-287 | Python | py/flask-constant-secret-key | Initializing SECRET_KEY of Flask application with Constant value |
CWE-287 | Python | py/improper-ldap-auth | Improper LDAP Authentication |
CWE-287 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-295 | Python | py/paramiko-missing-host-key-validation | Accepting unknown SSH host keys when using Paramiko |
CWE-295 | Python | py/request-without-cert-validation | Request without certificate validation |
CWE-311 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-311 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-311 | Python | py/insecure-cookie | Failure to use secure cookies |
CWE-312 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-312 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-315 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-321 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-326 | Python | py/weak-crypto-key | Use of weak cryptographic key |
CWE-326 | Python | py/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-326 | Python | py/unknown-asymmetric-key-gen-size | Unknown key generation key size |
CWE-326 | Python | py/weak-asymmetric-key-gen-size | Weak key generation key size (< 2048 bits) |
CWE-327 | Python | py/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-327 | Python | py/insecure-default-protocol | Default version of SSL/TLS may be insecure |
CWE-327 | Python | py/insecure-protocol | Use of insecure SSL/TLS version |
CWE-327 | Python | py/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-327 | Python | py/azure-storage/unsafe-client-side-encryption-in-use | Unsafe usage of v1 version of Azure Storage client-side encryption. |
CWE-327 | Python | py/weak-block-mode | Weak block mode |
CWE-327 | Python | py/weak-elliptic-curve | Weak elliptic curve |
CWE-327 | Python | py/weak-hashes | Weak hashes |
CWE-327 | Python | py/weak-symmetric-encryption | Weak symmetric encryption algorithm |
CWE-328 | Python | py/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-330 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-330 | Python | py/insecure-randomness | Insecure randomness |
CWE-330 | Python | py/predictable-token | Predictable token |
CWE-338 | Python | py/insecure-randomness | Insecure randomness |
CWE-340 | Python | py/predictable-token | Predictable token |
CWE-344 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-345 | Python | py/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-345 | Python | py/jwt-missing-verification | JWT missing secret or public key verification |
CWE-345 | Python | py/ip-address-spoofing | IP address spoofing |
CWE-347 | Python | py/jwt-missing-verification | JWT missing secret or public key verification |
CWE-348 | Python | py/ip-address-spoofing | IP address spoofing |
CWE-352 | Python | py/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-359 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-359 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-377 | Python | py/insecure-temporary-file | Insecure temporary file |
CWE-390 | Python | py/empty-except | Empty except |
CWE-396 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-398 | Python | py/unreachable-except | Unreachable 'except' block |
CWE-398 | Python | py/comparison-of-constants | Comparison of constants |
CWE-398 | Python | py/comparison-of-identical-expressions | Comparison of identical values |
CWE-398 | Python | py/comparison-missing-self | Maybe missing 'self' in comparison |
CWE-398 | Python | py/redundant-comparison | Redundant comparison |
CWE-398 | Python | py/duplicate-key-dict-literal | Duplicate key in dict literal |
CWE-398 | Python | py/import-deprecated-module | Import of deprecated module |
CWE-398 | Python | py/constant-conditional-expression | Constant in conditional expression or statement |
CWE-398 | Python | py/redundant-assignment | Redundant assignment |
CWE-398 | Python | py/ineffectual-statement | Statement has no effect |
CWE-398 | Python | py/unreachable-statement | Unreachable code |
CWE-398 | Python | py/multiple-definition | Variable defined multiple times |
CWE-398 | Python | py/unused-local-variable | Unused local variable |
CWE-398 | Python | py/unused-global-variable | Unused global variable |
CWE-400 | Python | py/file-not-closed | File is not always closed |
CWE-400 | Python | py/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-400 | Python | py/redos | Inefficient regular expression |
CWE-400 | Python | py/regex-injection | Regular expression injection |
CWE-400 | Python | py/xml-bomb | XML internal entity expansion |
CWE-400 | Python | py/unicode-dos | Denial of Service using Unicode Characters |
CWE-404 | Python | py/file-not-closed | File is not always closed |
CWE-405 | Python | py/xml-bomb | XML internal entity expansion |
CWE-405 | Python | py/decompression-bomb | Decompression Bomb |
CWE-405 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-409 | Python | py/xml-bomb | XML internal entity expansion |
CWE-409 | Python | py/decompression-bomb | Decompression Bomb |
CWE-409 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-441 | Python | py/full-ssrf | Full server-side request forgery |
CWE-441 | Python | py/partial-ssrf | Partial server-side request forgery |
CWE-477 | Python | py/import-deprecated-module | Import of deprecated module |
CWE-485 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-489 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-497 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-502 | Python | py/unsafe-deserialization | Deserialization of user-controlled data |
CWE-522 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-523 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-532 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-538 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-552 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-561 | Python | py/unreachable-except | Unreachable 'except' block |
CWE-561 | Python | py/comparison-of-constants | Comparison of constants |
CWE-561 | Python | py/comparison-of-identical-expressions | Comparison of identical values |
CWE-561 | Python | py/comparison-missing-self | Maybe missing 'self' in comparison |
CWE-561 | Python | py/redundant-comparison | Redundant comparison |
CWE-561 | Python | py/duplicate-key-dict-literal | Duplicate key in dict literal |
CWE-561 | Python | py/constant-conditional-expression | Constant in conditional expression or statement |
CWE-561 | Python | py/ineffectual-statement | Statement has no effect |
CWE-561 | Python | py/unreachable-statement | Unreachable code |
CWE-563 | Python | py/redundant-assignment | Redundant assignment |
CWE-563 | Python | py/multiple-definition | Variable defined multiple times |
CWE-563 | Python | py/unused-local-variable | Unused local variable |
CWE-563 | Python | py/unused-global-variable | Unused global variable |
CWE-570 | Python | py/comparison-of-constants | Comparison of constants |
CWE-570 | Python | py/comparison-of-identical-expressions | Comparison of identical values |
CWE-570 | Python | py/comparison-missing-self | Maybe missing 'self' in comparison |
CWE-570 | Python | py/redundant-comparison | Redundant comparison |
CWE-570 | Python | py/constant-conditional-expression | Constant in conditional expression or statement |
CWE-571 | Python | py/comparison-of-constants | Comparison of constants |
CWE-571 | Python | py/comparison-of-identical-expressions | Comparison of identical values |
CWE-571 | Python | py/comparison-missing-self | Maybe missing 'self' in comparison |
CWE-571 | Python | py/redundant-comparison | Redundant comparison |
CWE-571 | Python | py/constant-conditional-expression | Constant in conditional expression or statement |
CWE-573 | Python | py/equals-hash-mismatch | Inconsistent equality and hashing |
CWE-573 | Python | py/call/wrong-named-class-argument | Wrong name for an argument in a class instantiation |
CWE-573 | Python | py/call/wrong-number-class-arguments | Wrong number of arguments in a class instantiation |
CWE-573 | Python | py/super-not-enclosing-class | First argument to super() is not enclosing class |
CWE-573 | Python | py/call/wrong-named-argument | Wrong name for an argument in a call |
CWE-573 | Python | py/percent-format/wrong-arguments | Wrong number of arguments for format |
CWE-573 | Python | py/call/wrong-arguments | Wrong number of arguments in a call |
CWE-581 | Python | py/equals-hash-mismatch | Inconsistent equality and hashing |
CWE-584 | Python | py/exit-from-finally | 'break' or 'return' statement in finally |
CWE-601 | Python | py/url-redirection | URL redirection from remote source |
CWE-610 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-610 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-610 | Python | py/url-redirection | URL redirection from remote source |
CWE-610 | Python | py/xxe | XML external entity expansion |
CWE-610 | Python | py/full-ssrf | Full server-side request forgery |
CWE-610 | Python | py/partial-ssrf | Partial server-side request forgery |
CWE-611 | Python | py/xxe | XML external entity expansion |
CWE-614 | Python | py/insecure-cookie | Failure to use secure cookies |
CWE-628 | Python | py/call/wrong-named-class-argument | Wrong name for an argument in a class instantiation |
CWE-628 | Python | py/call/wrong-number-class-arguments | Wrong number of arguments in a class instantiation |
CWE-628 | Python | py/super-not-enclosing-class | First argument to super() is not enclosing class |
CWE-628 | Python | py/call/wrong-named-argument | Wrong name for an argument in a call |
CWE-628 | Python | py/percent-format/wrong-arguments | Wrong number of arguments for format |
CWE-628 | Python | py/call/wrong-arguments | Wrong number of arguments in a call |
CWE-642 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-642 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-643 | Python | py/xpath-injection | XPath query built from user-controlled sources |
CWE-643 | Python | py/xslt-injection | XSLT query built from user-controlled sources |
CWE-657 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-664 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-664 | Python | py/implicit-string-concatenation-in-list | Implicit string concatenation in a list |
CWE-664 | Python | py/file-not-closed | File is not always closed |
CWE-664 | Python | py/bind-socket-all-network-interfaces | Binding a socket to all network interfaces |
CWE-664 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-664 | Python | py/tarslip | Arbitrary file write during tarfile extraction |
CWE-664 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-664 | Python | py/code-injection | Code injection |
CWE-664 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-664 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-664 | Python | py/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-664 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-664 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-664 | Python | py/insecure-temporary-file | Insecure temporary file |
CWE-664 | Python | py/unsafe-deserialization | Deserialization of user-controlled data |
CWE-664 | Python | py/url-redirection | URL redirection from remote source |
CWE-664 | Python | py/xxe | XML external entity expansion |
CWE-664 | Python | py/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-664 | Python | py/redos | Inefficient regular expression |
CWE-664 | Python | py/regex-injection | Regular expression injection |
CWE-664 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-664 | Python | py/xml-bomb | XML internal entity expansion |
CWE-664 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-664 | Python | py/full-ssrf | Full server-side request forgery |
CWE-664 | Python | py/partial-ssrf | Partial server-side request forgery |
CWE-664 | Python | py/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-664 | Python | py/tarslip-extended | Arbitrary file write during tarfile extraction |
CWE-664 | Python | py/unsafe-unpacking | Arbitrary file write during a tarball extraction from a user controlled source |
CWE-664 | Python | py/js2py-rce | JavaScript code execution. |
CWE-664 | Python | py/possible-timing-attack-against-hash | Timing attack against Hash |
CWE-664 | Python | py/timing-attack-against-hash | Timing attack against Hash |
CWE-664 | Python | py/timing-attack-against-header-value | Timing attack against header value |
CWE-664 | Python | py/possible-timing-attack-sensitive-info | Timing attack against secret |
CWE-664 | Python | py/timing-attack-sensitive-info | Timing attack against secret |
CWE-664 | Python | py/flask-constant-secret-key | Initializing SECRET_KEY of Flask application with Constant value |
CWE-664 | Python | py/improper-ldap-auth | Improper LDAP Authentication |
CWE-664 | Python | py/decompression-bomb | Decompression Bomb |
CWE-664 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-664 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-664 | Python | py/unicode-dos | Denial of Service using Unicode Characters |
CWE-664 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-665 | Python | py/implicit-string-concatenation-in-list | Implicit string concatenation in a list |
CWE-665 | Python | py/unicode-dos | Denial of Service using Unicode Characters |
CWE-668 | Python | py/bind-socket-all-network-interfaces | Binding a socket to all network interfaces |
CWE-668 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-668 | Python | py/tarslip | Arbitrary file write during tarfile extraction |
CWE-668 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-668 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-668 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-668 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-668 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-668 | Python | py/insecure-temporary-file | Insecure temporary file |
CWE-668 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-668 | Python | py/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-668 | Python | py/tarslip-extended | Arbitrary file write during tarfile extraction |
CWE-668 | Python | py/unsafe-unpacking | Arbitrary file write during a tarball extraction from a user controlled source |
CWE-668 | Python | py/possible-timing-attack-against-hash | Timing attack against Hash |
CWE-668 | Python | py/timing-attack-against-hash | Timing attack against Hash |
CWE-668 | Python | py/timing-attack-against-header-value | Timing attack against header value |
CWE-668 | Python | py/possible-timing-attack-sensitive-info | Timing attack against secret |
CWE-668 | Python | py/timing-attack-sensitive-info | Timing attack against secret |
CWE-668 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-668 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-669 | Python | py/xxe | XML external entity expansion |
CWE-670 | Python | py/asserts-tuple | Asserting a tuple |
CWE-671 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-674 | Python | py/xml-bomb | XML internal entity expansion |
CWE-674 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-685 | Python | py/call/wrong-number-class-arguments | Wrong number of arguments in a class instantiation |
CWE-685 | Python | py/percent-format/wrong-arguments | Wrong number of arguments for format |
CWE-685 | Python | py/call/wrong-arguments | Wrong number of arguments in a call |
CWE-687 | Python | py/super-not-enclosing-class | First argument to super() is not enclosing class |
CWE-691 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-691 | Python | py/code-injection | Code injection |
CWE-691 | Python | py/xml-bomb | XML internal entity expansion |
CWE-691 | Python | py/asserts-tuple | Asserting a tuple |
CWE-691 | Python | py/exit-from-finally | 'break' or 'return' statement in finally |
CWE-691 | Python | py/js2py-rce | JavaScript code execution. |
CWE-691 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-691 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-693 | Python | py/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-693 | Python | py/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-693 | Python | py/cookie-injection | Construction of a cookie using user-supplied input |
CWE-693 | Python | py/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-693 | Python | py/incomplete-url-substring-sanitization | Incomplete URL substring sanitization |
CWE-693 | Python | py/overly-large-range | Overly permissive regular expression range |
CWE-693 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-693 | Python | py/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-693 | Python | py/paramiko-missing-host-key-validation | Accepting unknown SSH host keys when using Paramiko |
CWE-693 | Python | py/request-without-cert-validation | Request without certificate validation |
CWE-693 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-693 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-693 | Python | py/weak-crypto-key | Use of weak cryptographic key |
CWE-693 | Python | py/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-693 | Python | py/insecure-default-protocol | Default version of SSL/TLS may be insecure |
CWE-693 | Python | py/insecure-protocol | Use of insecure SSL/TLS version |
CWE-693 | Python | py/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-693 | Python | py/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-693 | Python | py/insecure-cookie | Failure to use secure cookies |
CWE-693 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-693 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-693 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-693 | Python | py/flask-constant-secret-key | Initializing SECRET_KEY of Flask application with Constant value |
CWE-693 | Python | py/improper-ldap-auth | Improper LDAP Authentication |
CWE-693 | Python | py/azure-storage/unsafe-client-side-encryption-in-use | Unsafe usage of v1 version of Azure Storage client-side encryption. |
CWE-693 | Python | py/jwt-missing-verification | JWT missing secret or public key verification |
CWE-693 | Python | py/ip-address-spoofing | IP address spoofing |
CWE-693 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-693 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-693 | Python | py/unknown-asymmetric-key-gen-size | Unknown key generation key size |
CWE-693 | Python | py/weak-asymmetric-key-gen-size | Weak key generation key size (< 2048 bits) |
CWE-693 | Python | py/weak-block-mode | Weak block mode |
CWE-693 | Python | py/weak-elliptic-curve | Weak elliptic curve |
CWE-693 | Python | py/weak-hashes | Weak hashes |
CWE-693 | Python | py/weak-symmetric-encryption | Weak symmetric encryption algorithm |
CWE-696 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-697 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-697 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-703 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-703 | Python | py/empty-except | Empty except |
CWE-703 | Python | py/ignored-return-value | Ignored return value |
CWE-703 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-705 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-705 | Python | py/exit-from-finally | 'break' or 'return' statement in finally |
CWE-706 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-706 | Python | py/tarslip | Arbitrary file write during tarfile extraction |
CWE-706 | Python | py/xxe | XML external entity expansion |
CWE-706 | Python | py/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-706 | Python | py/tarslip-extended | Arbitrary file write during tarfile extraction |
CWE-706 | Python | py/unsafe-unpacking | Arbitrary file write during a tarball extraction from a user controlled source |
CWE-707 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-707 | Python | py/command-line-injection | Uncontrolled command line |
CWE-707 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-707 | Python | py/jinja2/autoescape-false | Jinja2 templating with autoescape=False |
CWE-707 | Python | py/reflective-xss | Reflected server-side cross-site scripting |
CWE-707 | Python | py/sql-injection | SQL query built from user-controlled sources |
CWE-707 | Python | py/ldap-injection | LDAP query built from user-controlled sources |
CWE-707 | Python | py/code-injection | Code injection |
CWE-707 | Python | py/http-response-splitting | HTTP Response Splitting |
CWE-707 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-707 | Python | py/log-injection | Log Injection |
CWE-707 | Python | py/xpath-injection | XPath query built from user-controlled sources |
CWE-707 | Python | py/nosql-injection | NoSQL Injection |
CWE-707 | Python | py/template-injection | Server Side Template Injection |
CWE-707 | Python | py/paramiko-command-injection | Command execution on a secondary remote server |
CWE-707 | Python | py/reflective-xss-email | Reflected server-side cross-site scripting |
CWE-707 | Python | py/xslt-injection | XSLT query built from user-controlled sources |
CWE-707 | Python | py/js2py-rce | JavaScript code execution. |
CWE-707 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-710 | Python | py/equals-hash-mismatch | Inconsistent equality and hashing |
CWE-710 | Python | py/call/wrong-named-class-argument | Wrong name for an argument in a class instantiation |
CWE-710 | Python | py/call/wrong-number-class-arguments | Wrong number of arguments in a class instantiation |
CWE-710 | Python | py/unreachable-except | Unreachable 'except' block |
CWE-710 | Python | py/super-not-enclosing-class | First argument to super() is not enclosing class |
CWE-710 | Python | py/comparison-of-constants | Comparison of constants |
CWE-710 | Python | py/comparison-of-identical-expressions | Comparison of identical values |
CWE-710 | Python | py/comparison-missing-self | Maybe missing 'self' in comparison |
CWE-710 | Python | py/redundant-comparison | Redundant comparison |
CWE-710 | Python | py/duplicate-key-dict-literal | Duplicate key in dict literal |
CWE-710 | Python | py/call/wrong-named-argument | Wrong name for an argument in a call |
CWE-710 | Python | py/percent-format/wrong-arguments | Wrong number of arguments for format |
CWE-710 | Python | py/call/wrong-arguments | Wrong number of arguments in a call |
CWE-710 | Python | py/import-deprecated-module | Import of deprecated module |
CWE-710 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-710 | Python | py/constant-conditional-expression | Constant in conditional expression or statement |
CWE-710 | Python | py/redundant-assignment | Redundant assignment |
CWE-710 | Python | py/ineffectual-statement | Statement has no effect |
CWE-710 | Python | py/unreachable-statement | Unreachable code |
CWE-710 | Python | py/multiple-definition | Variable defined multiple times |
CWE-710 | Python | py/unused-local-variable | Unused local variable |
CWE-710 | Python | py/unused-global-variable | Unused global variable |
CWE-732 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-754 | Python | py/ignored-return-value | Ignored return value |
CWE-755 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-755 | Python | py/empty-except | Empty except |
CWE-755 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-770 | Python | py/unicode-dos | Denial of Service using Unicode Characters |
CWE-772 | Python | py/file-not-closed | File is not always closed |
CWE-776 | Python | py/xml-bomb | XML internal entity expansion |
CWE-776 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-798 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-827 | Python | py/xxe | XML external entity expansion |
CWE-829 | Python | py/xxe | XML external entity expansion |
CWE-834 | Python | py/xml-bomb | XML internal entity expansion |
CWE-834 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-913 | Python | py/code-injection | Code injection |
CWE-913 | Python | py/unsafe-deserialization | Deserialization of user-controlled data |
CWE-913 | Python | py/js2py-rce | JavaScript code execution. |
CWE-916 | Python | py/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-918 | Python | py/full-ssrf | Full server-side request forgery |
CWE-918 | Python | py/partial-ssrf | Partial server-side request forgery |
CWE-922 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-922 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-942 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-943 | Python | py/sql-injection | SQL query built from user-controlled sources |
CWE-943 | Python | py/ldap-injection | LDAP query built from user-controlled sources |
CWE-943 | Python | py/xpath-injection | XPath query built from user-controlled sources |
CWE-943 | Python | py/nosql-injection | NoSQL Injection |
CWE-943 | Python | py/xslt-injection | XSLT query built from user-controlled sources |
CWE-1004 | Python | py/insecure-cookie | Failure to use secure cookies |
CWE-1236 | Python | py/csv-injection | Csv Injection |
CWE-1275 | Python | py/insecure-cookie | Failure to use secure cookies |
CWE-1333 | Python | py/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-1333 | Python | py/redos | Inefficient regular expression |