Training in progress, epoch 1
Browse files- config.json +239 -231
- model.safetensors +2 -2
- training_args.bin +1 -1
config.json
CHANGED
@@ -38,34 +38,34 @@
|
|
38 |
"25": "CWE-1385 Missing Origin Validation in WebSockets",
|
39 |
"26": "CWE-1395 Dependency on Vulnerable Third-Party Component",
|
40 |
"27": "CWE-173",
|
41 |
-
"28": "CWE-
|
42 |
-
"29": "CWE-
|
43 |
"30": "CWE-190 - Integer Overflow",
|
44 |
"31": "CWE-190 Integer Overflow",
|
45 |
"32": "CWE-190 Integer Overflow or Wraparound",
|
46 |
"33": "CWE-190: Integer Overflow or Wraparound",
|
47 |
-
"34": "CWE-191
|
48 |
-
"35": "CWE-
|
49 |
"36": "CWE-20 Improper Input Validation",
|
50 |
"37": "CWE-200 - Information Disclosure",
|
51 |
"38": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
|
52 |
"39": "CWE-200 Information Disclosure",
|
53 |
-
"40": "CWE-
|
54 |
-
"41": "CWE-
|
55 |
-
"42": "CWE-208
|
56 |
-
"43": "CWE-
|
57 |
-
"44": "CWE-209 Information Exposure Through Error Message",
|
58 |
-
"45": "CWE-
|
59 |
-
"46": "CWE-
|
60 |
-
"47": "CWE-
|
61 |
-
"48": "CWE-22 Path Traversal",
|
62 |
-
"49": "CWE-
|
63 |
-
"50": "CWE-
|
64 |
-
"51": "CWE-
|
65 |
-
"52": "CWE-24 Path Traversal: '../filedir'",
|
66 |
-
"53": "CWE-
|
67 |
-
"54": "CWE-
|
68 |
-
"55": "CWE-
|
69 |
"56": "CWE-269",
|
70 |
"57": "CWE-269 Improper Privilege Management",
|
71 |
"58": "CWE-276 Incorrect Default Permissions",
|
@@ -75,25 +75,25 @@
|
|
75 |
"62": "CWE-285 Improper Authorization",
|
76 |
"63": "CWE-287 Improper Authentication",
|
77 |
"64": "CWE-295 Improper Certificate Validation",
|
78 |
-
"65": "CWE-
|
79 |
-
"66": "CWE-
|
80 |
-
"67": "CWE-
|
81 |
"68": "CWE-321 - Use of Hard-coded Cryptographic Key",
|
82 |
"69": "CWE-330 Insufficiently Random Values",
|
83 |
"70": "CWE-330 Use of Insufficiently Random Values",
|
84 |
"71": "CWE-337 Predictable Seed in Pseudo-Random Number Generator (PRNG)",
|
85 |
-
"72": "CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator",
|
86 |
-
"73": "CWE-
|
87 |
-
"74": "CWE-
|
88 |
-
"75": "CWE-
|
89 |
-
"76": "CWE-352
|
90 |
-
"77": "CWE-352 Cross-Site Request Forgery",
|
91 |
-
"78": "CWE-
|
92 |
-
"79": "CWE-
|
93 |
-
"80": "CWE-362
|
94 |
-
"81": "CWE-
|
95 |
-
"82": "CWE-
|
96 |
-
"83": "CWE-
|
97 |
"84": "CWE-384 Session Fixiation",
|
98 |
"85": "CWE-385 Covert Timing Channel",
|
99 |
"86": "CWE-392 Missing Report of Error Condition",
|
@@ -110,88 +110,92 @@
|
|
110 |
"97": "CWE-415 Double Free",
|
111 |
"98": "CWE-416 - Use After Free",
|
112 |
"99": "CWE-416 Use After Free",
|
113 |
-
"100": "CWE-
|
114 |
-
"101": "CWE-
|
115 |
-
"102": "CWE-434
|
116 |
-
"103": "CWE-434 Unrestricted Upload",
|
117 |
-
"104": "CWE-
|
118 |
-
"105": "CWE-
|
119 |
-
"106": "CWE-
|
120 |
-
"107": "CWE-
|
121 |
-
"108": "CWE-476
|
122 |
-
"109": "CWE-
|
123 |
-
"110": "CWE-
|
124 |
-
"111": "CWE-502
|
125 |
-
"112": "CWE-502 Deserialization",
|
126 |
-
"113": "CWE-502 Deserialization of Untrusted Data",
|
127 |
-
"114": "CWE-
|
128 |
"115": "CWE-522 Insufficiently Protected Credentials",
|
129 |
"116": "CWE-532",
|
130 |
-
"117": "CWE-
|
131 |
-
"118": "CWE-
|
132 |
-
"119": "CWE-
|
133 |
-
"120": "CWE-
|
134 |
-
"121": "CWE-601 Open Redirect",
|
135 |
-
"122": "CWE-
|
136 |
-
"123": "CWE-
|
137 |
-
"124": "CWE-
|
138 |
-
"125": "CWE-
|
139 |
-
"126": "CWE-
|
140 |
-
"127": "CWE-
|
141 |
-
"128": "CWE-
|
142 |
-
"129": "CWE-
|
143 |
-
"130": "CWE-
|
144 |
-
"131": "CWE-
|
145 |
-
"132": "CWE-
|
146 |
-
"133": "CWE-
|
147 |
-
"134": "CWE-
|
148 |
-
"135": "CWE-
|
149 |
-
"136": "CWE-
|
150 |
-
"137": "CWE-
|
151 |
-
"138": "CWE-
|
152 |
-
"139": "CWE-
|
153 |
-
"140": "CWE-
|
154 |
-
"141": "CWE-
|
155 |
-
"142": "CWE-
|
156 |
-
"143": "CWE-
|
157 |
-
"144": "CWE-77
|
158 |
-
"145": "CWE-
|
159 |
-
"146": "CWE-
|
160 |
-
"147": "CWE-
|
161 |
-
"148": "CWE-78
|
162 |
-
"149": "CWE-78 OS Command Injection",
|
163 |
-
"150": "CWE-
|
164 |
-
"151": "CWE-787 -
|
165 |
-
"152": "CWE-787
|
166 |
-
"153": "CWE-
|
167 |
-
"154": "CWE-
|
168 |
-
"155": "CWE-79
|
169 |
-
"156": "CWE-79 Cross Site Scripting",
|
170 |
-
"157": "CWE-79
|
171 |
-
"158": "CWE-
|
172 |
-
"159": "CWE-
|
173 |
-
"160": "CWE-
|
174 |
-
"161": "CWE-
|
175 |
-
"162": "CWE-
|
176 |
-
"163": "CWE-
|
177 |
-
"164": "CWE-
|
178 |
-
"165": "CWE-
|
179 |
-
"166": "CWE-
|
180 |
-
"167": "CWE-
|
181 |
-
"168": "CWE-
|
182 |
-
"169": "CWE-
|
183 |
-
"170": "CWE-
|
184 |
-
"171": "CWE-
|
185 |
-
"172": "CWE-
|
186 |
-
"173": "CWE-
|
187 |
-
"174": "CWE-
|
188 |
-
"175": "CWE-
|
189 |
-
"176": "CWE-918 Server-Side Request Forgery
|
190 |
-
"177": "CWE-
|
191 |
-
"178": "CWE-
|
192 |
-
"179": "CWE-
|
193 |
-
"180": "CWE-
|
194 |
-
"181": "CWE-
|
|
|
|
|
|
|
|
|
195 |
},
|
196 |
"initializer_range": 0.02,
|
197 |
"intermediate_size": 3072,
|
@@ -224,34 +228,34 @@
|
|
224 |
"CWE-1385 Missing Origin Validation in WebSockets": 25,
|
225 |
"CWE-1395 Dependency on Vulnerable Third-Party Component": 26,
|
226 |
"CWE-173": 27,
|
227 |
-
"CWE-
|
228 |
-
"CWE-
|
229 |
"CWE-190 - Integer Overflow": 30,
|
230 |
"CWE-190 Integer Overflow": 31,
|
231 |
"CWE-190 Integer Overflow or Wraparound": 32,
|
232 |
"CWE-190: Integer Overflow or Wraparound": 33,
|
233 |
-
"CWE-191
|
234 |
-
"CWE-
|
235 |
"CWE-20 Improper Input Validation": 36,
|
236 |
"CWE-200 - Information Disclosure": 37,
|
237 |
"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor": 38,
|
238 |
"CWE-200 Information Disclosure": 39,
|
239 |
-
"CWE-
|
240 |
-
"CWE-
|
241 |
-
"CWE-208
|
242 |
-
"CWE-
|
243 |
-
"CWE-209 Information Exposure Through Error Message": 44,
|
244 |
-
"CWE-
|
245 |
-
"CWE-
|
246 |
-
"CWE-
|
247 |
-
"CWE-22 Path Traversal": 48,
|
248 |
-
"CWE-
|
249 |
-
"CWE-
|
250 |
-
"CWE-
|
251 |
-
"CWE-24 Path Traversal: '../filedir'": 52,
|
252 |
-
"CWE-
|
253 |
-
"CWE-
|
254 |
-
"CWE-
|
255 |
"CWE-269": 56,
|
256 |
"CWE-269 Improper Privilege Management": 57,
|
257 |
"CWE-276 Incorrect Default Permissions": 58,
|
@@ -261,25 +265,25 @@
|
|
261 |
"CWE-285 Improper Authorization": 62,
|
262 |
"CWE-287 Improper Authentication": 63,
|
263 |
"CWE-295 Improper Certificate Validation": 64,
|
264 |
-
"CWE-
|
265 |
-
"CWE-
|
266 |
-
"CWE-
|
267 |
"CWE-321 - Use of Hard-coded Cryptographic Key": 68,
|
268 |
"CWE-330 Insufficiently Random Values": 69,
|
269 |
"CWE-330 Use of Insufficiently Random Values": 70,
|
270 |
"CWE-337 Predictable Seed in Pseudo-Random Number Generator (PRNG)": 71,
|
271 |
-
"CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator": 72,
|
272 |
-
"CWE-
|
273 |
-
"CWE-
|
274 |
-
"CWE-
|
275 |
-
"CWE-352
|
276 |
-
"CWE-352 Cross-Site Request Forgery": 77,
|
277 |
-
"CWE-
|
278 |
-
"CWE-
|
279 |
-
"CWE-362
|
280 |
-
"CWE-
|
281 |
-
"CWE-
|
282 |
-
"CWE-
|
283 |
"CWE-384 Session Fixiation": 84,
|
284 |
"CWE-385 Covert Timing Channel": 85,
|
285 |
"CWE-392 Missing Report of Error Condition": 86,
|
@@ -296,88 +300,92 @@
|
|
296 |
"CWE-415 Double Free": 97,
|
297 |
"CWE-416 - Use After Free": 98,
|
298 |
"CWE-416 Use After Free": 99,
|
299 |
-
"CWE-
|
300 |
-
"CWE-
|
301 |
-
"CWE-434
|
302 |
-
"CWE-434 Unrestricted Upload": 103,
|
303 |
-
"CWE-
|
304 |
-
"CWE-
|
305 |
-
"CWE-
|
306 |
-
"CWE-
|
307 |
-
"CWE-476
|
308 |
-
"CWE-
|
309 |
-
"CWE-
|
310 |
-
"CWE-502
|
311 |
-
"CWE-502 Deserialization": 112,
|
312 |
-
"CWE-502 Deserialization of Untrusted Data": 113,
|
313 |
-
"CWE-
|
314 |
"CWE-522 Insufficiently Protected Credentials": 115,
|
315 |
"CWE-532": 116,
|
316 |
-
"CWE-
|
317 |
-
"CWE-
|
318 |
-
"CWE-
|
319 |
-
"CWE-
|
320 |
-
"CWE-601 Open Redirect": 121,
|
321 |
-
"CWE-
|
322 |
-
"CWE-
|
323 |
-
"CWE-
|
324 |
-
"CWE-
|
325 |
-
"CWE-
|
326 |
-
"CWE-
|
327 |
-
"CWE-
|
328 |
-
"CWE-
|
329 |
-
"CWE-
|
330 |
-
"CWE-
|
331 |
-
"CWE-
|
332 |
-
"CWE-
|
333 |
-
"CWE-
|
334 |
-
"CWE-
|
335 |
-
"CWE-
|
336 |
-
"CWE-
|
337 |
-
"CWE-
|
338 |
-
"CWE-
|
339 |
-
"CWE-
|
340 |
-
"CWE-
|
341 |
-
"CWE-
|
342 |
-
"CWE-
|
343 |
-
"CWE-77
|
344 |
-
"CWE-
|
345 |
-
"CWE-
|
346 |
-
"CWE-
|
347 |
-
"CWE-78
|
348 |
-
"CWE-78 OS Command Injection": 149,
|
349 |
-
"CWE-
|
350 |
-
"CWE-787 -
|
351 |
-
"CWE-787
|
352 |
-
"CWE-
|
353 |
-
"CWE-
|
354 |
-
"CWE-79
|
355 |
-
"CWE-79 Cross Site Scripting": 156,
|
356 |
-
"CWE-79
|
357 |
-
"CWE-
|
358 |
-
"CWE-
|
359 |
-
"CWE-
|
360 |
-
"CWE-
|
361 |
-
"CWE-
|
362 |
-
"CWE-
|
363 |
-
"CWE-
|
364 |
-
"CWE-
|
365 |
-
"CWE-
|
366 |
-
"CWE-
|
367 |
-
"CWE-
|
368 |
-
"CWE-
|
369 |
-
"CWE-
|
370 |
-
"CWE-
|
371 |
-
"CWE-
|
372 |
-
"CWE-
|
373 |
-
"CWE-
|
374 |
-
"CWE-
|
375 |
-
"CWE-918 Server-Side Request Forgery
|
376 |
-
"CWE-
|
377 |
-
"CWE-
|
378 |
-
"CWE-
|
379 |
-
"CWE-
|
380 |
-
"CWE-
|
|
|
|
|
|
|
|
|
381 |
},
|
382 |
"layer_norm_eps": 1e-05,
|
383 |
"max_position_embeddings": 514,
|
@@ -388,7 +396,7 @@
|
|
388 |
"pad_token_id": 1,
|
389 |
"position_embedding_type": "absolute",
|
390 |
"torch_dtype": "float32",
|
391 |
-
"transformers_version": "4.
|
392 |
"type_vocab_size": 1,
|
393 |
"use_cache": true,
|
394 |
"vocab_size": 50265
|
|
|
38 |
"25": "CWE-1385 Missing Origin Validation in WebSockets",
|
39 |
"26": "CWE-1395 Dependency on Vulnerable Third-Party Component",
|
40 |
"27": "CWE-173",
|
41 |
+
"28": "CWE-178 Improper Handling of Case Sensitivity",
|
42 |
+
"29": "CWE-184 Incomplete List of Disallowed Inputs",
|
43 |
"30": "CWE-190 - Integer Overflow",
|
44 |
"31": "CWE-190 Integer Overflow",
|
45 |
"32": "CWE-190 Integer Overflow or Wraparound",
|
46 |
"33": "CWE-190: Integer Overflow or Wraparound",
|
47 |
+
"34": "CWE-191 Integer Underflow (Wrap or Wraparound)",
|
48 |
+
"35": "CWE-191: Integer Underflow (Wrap or Wraparound)",
|
49 |
"36": "CWE-20 Improper Input Validation",
|
50 |
"37": "CWE-200 - Information Disclosure",
|
51 |
"38": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
|
52 |
"39": "CWE-200 Information Disclosure",
|
53 |
+
"40": "CWE-201: Insertion of Sensitive Information Into Sent Data",
|
54 |
+
"41": "CWE-203 Information Exposure Through Discrepancy",
|
55 |
+
"42": "CWE-208 Observable Timing Discrepancy",
|
56 |
+
"43": "CWE-208: Observable Timing Discrepancy",
|
57 |
+
"44": "CWE-209 - Information Exposure Through Error Message",
|
58 |
+
"45": "CWE-209 Generation of Error Message Containing Sensitive Information",
|
59 |
+
"46": "CWE-209 Information Exposure Through Error Message",
|
60 |
+
"47": "CWE-21 Pathname Traversal",
|
61 |
+
"48": "CWE-22 - Path Traversal",
|
62 |
+
"49": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
|
63 |
+
"50": "CWE-22 Path Traversal",
|
64 |
+
"51": "CWE-235 Improper Handling of Extra Parameters",
|
65 |
+
"52": "CWE-24 - Path Traversal: '../filedir'",
|
66 |
+
"53": "CWE-24 Path Traversal: '../filedir'",
|
67 |
+
"54": "CWE-241: Improper Handling of Unexpected Data Type",
|
68 |
+
"55": "CWE-259 Use of Hard-coded Password",
|
69 |
"56": "CWE-269",
|
70 |
"57": "CWE-269 Improper Privilege Management",
|
71 |
"58": "CWE-276 Incorrect Default Permissions",
|
|
|
75 |
"62": "CWE-285 Improper Authorization",
|
76 |
"63": "CWE-287 Improper Authentication",
|
77 |
"64": "CWE-295 Improper Certificate Validation",
|
78 |
+
"65": "CWE-297",
|
79 |
+
"66": "CWE-306 Missing Authentication for Critical Function",
|
80 |
+
"67": "CWE-307 Improper Restriction of Excessive Authentication Attempts",
|
81 |
"68": "CWE-321 - Use of Hard-coded Cryptographic Key",
|
82 |
"69": "CWE-330 Insufficiently Random Values",
|
83 |
"70": "CWE-330 Use of Insufficiently Random Values",
|
84 |
"71": "CWE-337 Predictable Seed in Pseudo-Random Number Generator (PRNG)",
|
85 |
+
"72": "CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
|
86 |
+
"73": "CWE-340 Generation of Predictable Numbers or Identifiers",
|
87 |
+
"74": "CWE-345 Insufficient Verification of Data Authenticity",
|
88 |
+
"75": "CWE-352 - Cross-Site Request Forgery",
|
89 |
+
"76": "CWE-352 Cross-Site Request Forgery",
|
90 |
+
"77": "CWE-352 Cross-Site Request Forgery (CSRF)",
|
91 |
+
"78": "CWE-354 Improper Validation of Integrity Check Value",
|
92 |
+
"79": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
|
93 |
+
"80": "CWE-362 Race Condition",
|
94 |
+
"81": "CWE-366 Race Condition within a Thread",
|
95 |
+
"82": "CWE-377 Insecure Temporary File",
|
96 |
+
"83": "CWE-384 - Session Fixiation",
|
97 |
"84": "CWE-384 Session Fixiation",
|
98 |
"85": "CWE-385 Covert Timing Channel",
|
99 |
"86": "CWE-392 Missing Report of Error Condition",
|
|
|
110 |
"97": "CWE-415 Double Free",
|
111 |
"98": "CWE-416 - Use After Free",
|
112 |
"99": "CWE-416 Use After Free",
|
113 |
+
"100": "CWE-428 Unquoted Search Path or Element",
|
114 |
+
"101": "CWE-434 - Unrestricted Upload",
|
115 |
+
"102": "CWE-434 Unrestricted Upload",
|
116 |
+
"103": "CWE-434 Unrestricted Upload of File with Dangerous Type",
|
117 |
+
"104": "CWE-440 Expected Behavior Violation",
|
118 |
+
"105": "CWE-444 HTTP Request Smuggling",
|
119 |
+
"106": "CWE-472 External Control of Assumed-Immutable Web Parameter",
|
120 |
+
"107": "CWE-476 - NULL Pointer Dereference",
|
121 |
+
"108": "CWE-476 NULL Pointer Dereference",
|
122 |
+
"109": "CWE-497",
|
123 |
+
"110": "CWE-502 - Deserialization",
|
124 |
+
"111": "CWE-502 Deserialization",
|
125 |
+
"112": "CWE-502 Deserialization of Untrusted Data",
|
126 |
+
"113": "CWE-502: Deserialization of Untrusted Data",
|
127 |
+
"114": "CWE-521 - Weak Password Requirements",
|
128 |
"115": "CWE-522 Insufficiently Protected Credentials",
|
129 |
"116": "CWE-532",
|
130 |
+
"117": "CWE-532 Insertion of Sensitive Information into Log File",
|
131 |
+
"118": "CWE-548 Exposure of Information Through Directory Listing",
|
132 |
+
"119": "CWE-59 Improper Link Resolution Before File Access ('Link Following')",
|
133 |
+
"120": "CWE-597 Use of Wrong Operator in String Comparison",
|
134 |
+
"121": "CWE-601 - Open Redirect",
|
135 |
+
"122": "CWE-601 Open Redirect",
|
136 |
+
"123": "CWE-606 Unchecked Input for Loop Condition",
|
137 |
+
"124": "CWE-61 Symlink Following",
|
138 |
+
"125": "CWE-611 XML External Entity Reference",
|
139 |
+
"126": "CWE-613 Insufficient Session Expiration",
|
140 |
+
"127": "CWE-614 Sensitive Cookie Without Secure Attribute",
|
141 |
+
"128": "CWE-617 - Reachable Assertion",
|
142 |
+
"129": "CWE-639 - Authorization Bypass",
|
143 |
+
"130": "CWE-640 Weak Password Recovery",
|
144 |
+
"131": "CWE-667 Improper Locking",
|
145 |
+
"132": "CWE-674 Uncontrolled Recursion",
|
146 |
+
"133": "CWE-690 Unchecked Return Value to NULL Pointer Dereference",
|
147 |
+
"134": "CWE-693 Protection Mechanism Failure",
|
148 |
+
"135": "CWE-697 Incorrect Comparison",
|
149 |
+
"136": "CWE-704 Incorrect Type Conversion",
|
150 |
+
"137": "CWE-73",
|
151 |
+
"138": "CWE-73 File Inclusion",
|
152 |
+
"139": "CWE-732 Incorrect Permission Assignment for Critical Resource",
|
153 |
+
"140": "CWE-74 - Injection",
|
154 |
+
"141": "CWE-74 Injection",
|
155 |
+
"142": "CWE-755 Improper Handling of Exceptional Conditions",
|
156 |
+
"143": "CWE-769 - Uncontrolled File Descriptor Consumption",
|
157 |
+
"144": "CWE-77 - Command Injection",
|
158 |
+
"145": "CWE-77 Command Injection",
|
159 |
+
"146": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')",
|
160 |
+
"147": "CWE-770",
|
161 |
+
"148": "CWE-78 - OS Command Injection",
|
162 |
+
"149": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
|
163 |
+
"150": "CWE-78 OS Command Injection",
|
164 |
+
"151": "CWE-787 - Out-of-bounds Write",
|
165 |
+
"152": "CWE-787 - out-of-bounds write",
|
166 |
+
"153": "CWE-787 Out-of-bounds Write",
|
167 |
+
"154": "CWE-789 Uncontrolled Memory Allocation",
|
168 |
+
"155": "CWE-79",
|
169 |
+
"156": "CWE-79 - Cross Site Scripting",
|
170 |
+
"157": "CWE-79 Cross Site Scripting",
|
171 |
+
"158": "CWE-79 Cross-Site Scripting (XSS)",
|
172 |
+
"159": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')",
|
173 |
+
"160": "CWE-798 Hard-coded Credentials",
|
174 |
+
"161": "CWE-80 Basic Cross Site Scripting",
|
175 |
+
"162": "CWE-804 - Guessable CAPTCHA",
|
176 |
+
"163": "CWE-824 - Uninitialized Pointer",
|
177 |
+
"164": "CWE-824 Access of Uninitialized Pointer",
|
178 |
+
"165": "CWE-834 Excessive Iteration",
|
179 |
+
"166": "CWE-835 Infinite Loop",
|
180 |
+
"167": "CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop')",
|
181 |
+
"168": "CWE-840 - Business Logic Errors",
|
182 |
+
"169": "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')",
|
183 |
+
"170": "CWE-862 Missing Authorization",
|
184 |
+
"171": "CWE-863 Incorrect Authorization",
|
185 |
+
"172": "CWE-89 - SQL Injection",
|
186 |
+
"173": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
|
187 |
+
"174": "CWE-89 SQL Injection",
|
188 |
+
"175": "CWE-90 LDAP Injection",
|
189 |
+
"176": "CWE-918 - Server-Side Request Forgery",
|
190 |
+
"177": "CWE-918 Server-Side Request Forgery",
|
191 |
+
"178": "CWE-918 Server-Side Request Forgery (SSRF)",
|
192 |
+
"179": "CWE-926 Improper Export of Android Application Components",
|
193 |
+
"180": "CWE-927 Use of Implicit Intent for Sensitive Communication",
|
194 |
+
"181": "CWE-94 - Code Injection",
|
195 |
+
"182": "CWE-94 Code Injection",
|
196 |
+
"183": "CWE-99 Improper Control of Resource Identifiers",
|
197 |
+
"184": "Privilege Escalation",
|
198 |
+
"185": "n/a"
|
199 |
},
|
200 |
"initializer_range": 0.02,
|
201 |
"intermediate_size": 3072,
|
|
|
228 |
"CWE-1385 Missing Origin Validation in WebSockets": 25,
|
229 |
"CWE-1395 Dependency on Vulnerable Third-Party Component": 26,
|
230 |
"CWE-173": 27,
|
231 |
+
"CWE-178 Improper Handling of Case Sensitivity": 28,
|
232 |
+
"CWE-184 Incomplete List of Disallowed Inputs": 29,
|
233 |
"CWE-190 - Integer Overflow": 30,
|
234 |
"CWE-190 Integer Overflow": 31,
|
235 |
"CWE-190 Integer Overflow or Wraparound": 32,
|
236 |
"CWE-190: Integer Overflow or Wraparound": 33,
|
237 |
+
"CWE-191 Integer Underflow (Wrap or Wraparound)": 34,
|
238 |
+
"CWE-191: Integer Underflow (Wrap or Wraparound)": 35,
|
239 |
"CWE-20 Improper Input Validation": 36,
|
240 |
"CWE-200 - Information Disclosure": 37,
|
241 |
"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor": 38,
|
242 |
"CWE-200 Information Disclosure": 39,
|
243 |
+
"CWE-201: Insertion of Sensitive Information Into Sent Data": 40,
|
244 |
+
"CWE-203 Information Exposure Through Discrepancy": 41,
|
245 |
+
"CWE-208 Observable Timing Discrepancy": 42,
|
246 |
+
"CWE-208: Observable Timing Discrepancy": 43,
|
247 |
+
"CWE-209 - Information Exposure Through Error Message": 44,
|
248 |
+
"CWE-209 Generation of Error Message Containing Sensitive Information": 45,
|
249 |
+
"CWE-209 Information Exposure Through Error Message": 46,
|
250 |
+
"CWE-21 Pathname Traversal": 47,
|
251 |
+
"CWE-22 - Path Traversal": 48,
|
252 |
+
"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')": 49,
|
253 |
+
"CWE-22 Path Traversal": 50,
|
254 |
+
"CWE-235 Improper Handling of Extra Parameters": 51,
|
255 |
+
"CWE-24 - Path Traversal: '../filedir'": 52,
|
256 |
+
"CWE-24 Path Traversal: '../filedir'": 53,
|
257 |
+
"CWE-241: Improper Handling of Unexpected Data Type": 54,
|
258 |
+
"CWE-259 Use of Hard-coded Password": 55,
|
259 |
"CWE-269": 56,
|
260 |
"CWE-269 Improper Privilege Management": 57,
|
261 |
"CWE-276 Incorrect Default Permissions": 58,
|
|
|
265 |
"CWE-285 Improper Authorization": 62,
|
266 |
"CWE-287 Improper Authentication": 63,
|
267 |
"CWE-295 Improper Certificate Validation": 64,
|
268 |
+
"CWE-297": 65,
|
269 |
+
"CWE-306 Missing Authentication for Critical Function": 66,
|
270 |
+
"CWE-307 Improper Restriction of Excessive Authentication Attempts": 67,
|
271 |
"CWE-321 - Use of Hard-coded Cryptographic Key": 68,
|
272 |
"CWE-330 Insufficiently Random Values": 69,
|
273 |
"CWE-330 Use of Insufficiently Random Values": 70,
|
274 |
"CWE-337 Predictable Seed in Pseudo-Random Number Generator (PRNG)": 71,
|
275 |
+
"CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)": 72,
|
276 |
+
"CWE-340 Generation of Predictable Numbers or Identifiers": 73,
|
277 |
+
"CWE-345 Insufficient Verification of Data Authenticity": 74,
|
278 |
+
"CWE-352 - Cross-Site Request Forgery": 75,
|
279 |
+
"CWE-352 Cross-Site Request Forgery": 76,
|
280 |
+
"CWE-352 Cross-Site Request Forgery (CSRF)": 77,
|
281 |
+
"CWE-354 Improper Validation of Integrity Check Value": 78,
|
282 |
+
"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')": 79,
|
283 |
+
"CWE-362 Race Condition": 80,
|
284 |
+
"CWE-366 Race Condition within a Thread": 81,
|
285 |
+
"CWE-377 Insecure Temporary File": 82,
|
286 |
+
"CWE-384 - Session Fixiation": 83,
|
287 |
"CWE-384 Session Fixiation": 84,
|
288 |
"CWE-385 Covert Timing Channel": 85,
|
289 |
"CWE-392 Missing Report of Error Condition": 86,
|
|
|
300 |
"CWE-415 Double Free": 97,
|
301 |
"CWE-416 - Use After Free": 98,
|
302 |
"CWE-416 Use After Free": 99,
|
303 |
+
"CWE-428 Unquoted Search Path or Element": 100,
|
304 |
+
"CWE-434 - Unrestricted Upload": 101,
|
305 |
+
"CWE-434 Unrestricted Upload": 102,
|
306 |
+
"CWE-434 Unrestricted Upload of File with Dangerous Type": 103,
|
307 |
+
"CWE-440 Expected Behavior Violation": 104,
|
308 |
+
"CWE-444 HTTP Request Smuggling": 105,
|
309 |
+
"CWE-472 External Control of Assumed-Immutable Web Parameter": 106,
|
310 |
+
"CWE-476 - NULL Pointer Dereference": 107,
|
311 |
+
"CWE-476 NULL Pointer Dereference": 108,
|
312 |
+
"CWE-497": 109,
|
313 |
+
"CWE-502 - Deserialization": 110,
|
314 |
+
"CWE-502 Deserialization": 111,
|
315 |
+
"CWE-502 Deserialization of Untrusted Data": 112,
|
316 |
+
"CWE-502: Deserialization of Untrusted Data": 113,
|
317 |
+
"CWE-521 - Weak Password Requirements": 114,
|
318 |
"CWE-522 Insufficiently Protected Credentials": 115,
|
319 |
"CWE-532": 116,
|
320 |
+
"CWE-532 Insertion of Sensitive Information into Log File": 117,
|
321 |
+
"CWE-548 Exposure of Information Through Directory Listing": 118,
|
322 |
+
"CWE-59 Improper Link Resolution Before File Access ('Link Following')": 119,
|
323 |
+
"CWE-597 Use of Wrong Operator in String Comparison": 120,
|
324 |
+
"CWE-601 - Open Redirect": 121,
|
325 |
+
"CWE-601 Open Redirect": 122,
|
326 |
+
"CWE-606 Unchecked Input for Loop Condition": 123,
|
327 |
+
"CWE-61 Symlink Following": 124,
|
328 |
+
"CWE-611 XML External Entity Reference": 125,
|
329 |
+
"CWE-613 Insufficient Session Expiration": 126,
|
330 |
+
"CWE-614 Sensitive Cookie Without Secure Attribute": 127,
|
331 |
+
"CWE-617 - Reachable Assertion": 128,
|
332 |
+
"CWE-639 - Authorization Bypass": 129,
|
333 |
+
"CWE-640 Weak Password Recovery": 130,
|
334 |
+
"CWE-667 Improper Locking": 131,
|
335 |
+
"CWE-674 Uncontrolled Recursion": 132,
|
336 |
+
"CWE-690 Unchecked Return Value to NULL Pointer Dereference": 133,
|
337 |
+
"CWE-693 Protection Mechanism Failure": 134,
|
338 |
+
"CWE-697 Incorrect Comparison": 135,
|
339 |
+
"CWE-704 Incorrect Type Conversion": 136,
|
340 |
+
"CWE-73": 137,
|
341 |
+
"CWE-73 File Inclusion": 138,
|
342 |
+
"CWE-732 Incorrect Permission Assignment for Critical Resource": 139,
|
343 |
+
"CWE-74 - Injection": 140,
|
344 |
+
"CWE-74 Injection": 141,
|
345 |
+
"CWE-755 Improper Handling of Exceptional Conditions": 142,
|
346 |
+
"CWE-769 - Uncontrolled File Descriptor Consumption": 143,
|
347 |
+
"CWE-77 - Command Injection": 144,
|
348 |
+
"CWE-77 Command Injection": 145,
|
349 |
+
"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')": 146,
|
350 |
+
"CWE-770": 147,
|
351 |
+
"CWE-78 - OS Command Injection": 148,
|
352 |
+
"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')": 149,
|
353 |
+
"CWE-78 OS Command Injection": 150,
|
354 |
+
"CWE-787 - Out-of-bounds Write": 151,
|
355 |
+
"CWE-787 - out-of-bounds write": 152,
|
356 |
+
"CWE-787 Out-of-bounds Write": 153,
|
357 |
+
"CWE-789 Uncontrolled Memory Allocation": 154,
|
358 |
+
"CWE-79": 155,
|
359 |
+
"CWE-79 - Cross Site Scripting": 156,
|
360 |
+
"CWE-79 Cross Site Scripting": 157,
|
361 |
+
"CWE-79 Cross-Site Scripting (XSS)": 158,
|
362 |
+
"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')": 159,
|
363 |
+
"CWE-798 Hard-coded Credentials": 160,
|
364 |
+
"CWE-80 Basic Cross Site Scripting": 161,
|
365 |
+
"CWE-804 - Guessable CAPTCHA": 162,
|
366 |
+
"CWE-824 - Uninitialized Pointer": 163,
|
367 |
+
"CWE-824 Access of Uninitialized Pointer": 164,
|
368 |
+
"CWE-834 Excessive Iteration": 165,
|
369 |
+
"CWE-835 Infinite Loop": 166,
|
370 |
+
"CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop')": 167,
|
371 |
+
"CWE-840 - Business Logic Errors": 168,
|
372 |
+
"CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')": 169,
|
373 |
+
"CWE-862 Missing Authorization": 170,
|
374 |
+
"CWE-863 Incorrect Authorization": 171,
|
375 |
+
"CWE-89 - SQL Injection": 172,
|
376 |
+
"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')": 173,
|
377 |
+
"CWE-89 SQL Injection": 174,
|
378 |
+
"CWE-90 LDAP Injection": 175,
|
379 |
+
"CWE-918 - Server-Side Request Forgery": 176,
|
380 |
+
"CWE-918 Server-Side Request Forgery": 177,
|
381 |
+
"CWE-918 Server-Side Request Forgery (SSRF)": 178,
|
382 |
+
"CWE-926 Improper Export of Android Application Components": 179,
|
383 |
+
"CWE-927 Use of Implicit Intent for Sensitive Communication": 180,
|
384 |
+
"CWE-94 - Code Injection": 181,
|
385 |
+
"CWE-94 Code Injection": 182,
|
386 |
+
"CWE-99 Improper Control of Resource Identifiers": 183,
|
387 |
+
"Privilege Escalation": 184,
|
388 |
+
"n/a": 185
|
389 |
},
|
390 |
"layer_norm_eps": 1e-05,
|
391 |
"max_position_embeddings": 514,
|
|
|
396 |
"pad_token_id": 1,
|
397 |
"position_embedding_type": "absolute",
|
398 |
"torch_dtype": "float32",
|
399 |
+
"transformers_version": "4.55.0",
|
400 |
"type_vocab_size": 1,
|
401 |
"use_cache": true,
|
402 |
"vocab_size": 50265
|
model.safetensors
CHANGED
@@ -1,3 +1,3 @@
|
|
1 |
version https://git-lfs.github.com/spec/v1
|
2 |
-
oid sha256:
|
3 |
-
size
|
|
|
1 |
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ecac27599613e9969dc005f2f791ecf3b750bca01e801e7c2b66c378445395f9
|
3 |
+
size 499178808
|
training_args.bin
CHANGED
@@ -1,3 +1,3 @@
|
|
1 |
version https://git-lfs.github.com/spec/v1
|
2 |
-
oid sha256:
|
3 |
size 5777
|
|
|
1 |
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d7694abf0166f9b43898f7e61bc9abd620db91b4e23560125dcd16847de2444e
|
3 |
size 5777
|