VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
721
CVE-2009-0367
Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote code execution by exploiting whitelisted module hierarchy

The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Remote
720
CVE-2008-5103
Root password bypass in VMBuilder 0.9

The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Local
719
CVE-2019-9189
Arbitrary Python script upload in Prima Systems FlexAir, versions 2.4.9api3 and prior, leads to full system access for authenticated attackers due to root code execution

Prima Systems FlexAir, Versions 2.4.9api3 and prior. The application allows the upload of arbitrary Python scripts when configuring the main central controller. These scripts can be immediately executed because of root code execution, not as a web server user, allowing an authenticated attacker to gain full system access.

Function
Input Validation and Sanitization
Command Injection
Remote
718
CVE-2021-46850
Vesta Control Panel <0.9.8-26-43 and <0.9.8-26 command injection via v_sftp_license parameter

myVesta Control Panel before 0.9.8-26-43 and Vesta Control Panel before 0.9.8-26 are vulnerable to command injection. An authenticated and remote administrative user can execute arbitrary commands via the v_sftp_license parameter when sending HTTP POST requests to the /edit/server endpoint.

Function
Input Validation and Sanitization
Command Injection
Remote
717
CVE-2020-28493
ReDoS vulnerability in jinja2 regex

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
716
CVE-2022-41887
TensorFlow crash: dimensions overflow in tf.keras.losses.poisson

TensorFlow is an open source platform for machine learning. `tf.keras.losses.poisson` receives a `y_pred` and `y_true` that are passed through `functor::mul` in `BinaryOp`. If the resulting dimensions overflow an `int32`, TensorFlow will crash due to a size mismatch during broadcast assignment. We have patched the issue in GitHub commit c5b30379ba87cbe774b08ac50c1f6d36df4ebb7c. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1 and 2.9.3, as these are also affected and still in supported range. However, we will not cherrypick this commit into TensorFlow 2.8.x, as it depends on Eigen behavior that changed between 2.8 and 2.9.

Function
Numeric Errors
Integer Overflows
Local
715
CVE-2019-10904
Roundup 1.6 XSS via URI in frontends/roundup.cgi and roundup/cgi/wsgi_handler.py mishandling 404 errors

Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_handler.py mishandle 404 errors.

Function
Configuration Issues
Cross-Site Scripting (XSS)
Remote
714
CVE-2023-46127
Frappe HTML Injection in desk

Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and an integrated client side library. A malicious Frappe user with desk access could create documents containing HTML payloads allowing HTML Injection. This vulnerability has been patched in version 14.49.0.

Function
Input Validation and Sanitization
Command Injection
Local
713
CVE-2021-42561
CALDERA 2.8.1 Human plugin allows shell command injection via unsanitized "name" parameter

An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.

Function
Input Validation and Sanitization
Command Injection
Remote
712
CVE-2011-3587
Unspecified Zope 2.12.x and 2.13.x vulnerability allows remote command execution via OFS/misc_.py and Python modules

Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2, allows remote attackers to execute arbitrary commands via vectors related to the p_ class in OFS/misc_.py and the use of Python modules.

Function
Input Validation and Sanitization
Command Injection
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::