VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
731
CVE-2019-9852
LibreOffice : Macro Execution Bypass

LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.

Function
Input Validation and Sanitization
Path Traversal
Remote
730
CVE-2022-41607
ETIC RAS 4.5.0 and earlier API directory traversal vulnerability

All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and priorโ€™s application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more.

Function
Input Validation and Sanitization
Path Traversal
Remote
729
CVE-2022-30034
Flower (Celery web UI) OAuth bypass vulnerability

Flower, a web UI for the Celery Python RPC framework, all versions as of 05-02-2022 is vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Remote
728
CVE-2021-33571
Django 2.2 < 2.2.24, 3.x < 3.1.12, 3.2 < 3.2.4: IP validation allows leading zero in octal literals

In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
727
CVE-2021-28667
StackStorm < 3.4.1, Python 3.x, non-utf-8 locale, Unicode data, infinite loop

StackStorm before 3.4.1, in some situations, has an infinite loop that consumes all available memory and disk space. This can occur if Python 3.x is used, the locale is not utf-8, and there is an attempt to log Unicode data (from an action or rule name).

Function
Resource Management
Resource Exhaustion
Local
726
CVE-2018-6461
Insecure Library Loading in March Hare WINCVS before 2.8.01 and CVS Suite before 2009R2 build 6610 via DLL files

March Hare WINCVS before 2.8.01 build 6610, and CVS Suite before 2009R2 build 6610, contains an Insecure Library Loading vulnerability in the wincvs2.exe or wincvs.exe file, which may allow local users to gain privileges via a Trojan horse Python or TCL DLL file in the current working directory.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
725
CVE-2013-2072
Buffer overflow in Python Xen bindings (Xen 4.0.x, 4.1.x, 4.2.x) via xc_vcpu_setaffinity call

Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap.

Function
Memory Corruption
Buffer Overflows
Local
724
CVE-2013-1909
Unverified SSL hostname in Apache Qpid Python client

The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Checking
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
723
CVE-2012-0861
Insecure SSL validation in RHEV-M vds_installer (pre-3.1) allows remote code execution via MITM

The vds_installer in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, uses the -k curl parameter when downloading deployUtil.py and vds_bootstrap.py, which prevents SSL certificates from being validated and allows remote attackers to execute arbitrary Python code via a man-in-the-middle attack.

Function
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
722
CVE-2009-3578
Maya 3D Software Remote Code Execution via MEL Commands in .ma and .mb Files

Autodesk Maya 8.0, 8.5, 2008, 2009, and 2010 and Alias Wavefront Maya 6.5 and 7.0 allow remote attackers to execute arbitrary code via a (1) .ma or (2) .mb file that uses the Maya Embedded Language (MEL) python command or unspecified other MEL commands, related to "Script Nodes."

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::