VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
701
CVE-2023-23930
Vantage6 < 4.0.0 uses insecure default serialization (pickle)

vantage6 is privacy preserving federated learning infrastructure. Versions prior to 4.0.0 use pickle, which has known security issue, as a default serialization module but that has known security issues. All users of vantage6 that post tasks with the default serialization are affected. Version 4.0.0 contains a patch. Users may specify JSON serialization as a workaround.

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
700
CVE-2021-26813
markdown2 < 2.4.0 regex DoS vulnerability

markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
699
CVE-2022-30688
Local privilege escalation via unanchored regex checks in needrestart 0.8 to 3.5 (pre-3.6).

needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
698
CVE-2023-26051
Saleor GraphQL exposes sensitive data in error messages

Saleor is a headless, GraphQL commerce platform delivering personalized shopping experiences. Some internal Python exceptions are not handled properly and thus are returned in API as error messages. Some messages might contain sensitive information like user email address in staff-authenticated requests.

Function
Information Leakage
Insecure Handling of Sensitive Data
Remote
697
CVE-2021-36359
OrbiTeam BSCW Classic < 7.4.3 RCE via XML injection in bscw.cgi op=_editfolder.EditFolder

OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
696
CVE-2017-1000483
Plone versions 4 and 5: Private content access via str.format in through-the-web templates and scripts

Accessing private content via str.format in through-the-web templates and scripts in Plone 2.5-5.1rc1. This improves an earlier hotfix. Since the format method was introduced in Python 2.6, this part of the hotfix is only relevant for Plone 4 and 5.

Function
Input Validation and Sanitization
Insecure Direct Object References (IDOR)
Remote
695
CVE-2015-2316
Django versions before 1.6.11, 1.7.7, and 1.8c1 vulnerable to denial-of-service (infinite loop) due to "strip_tags" function with specific Python versions

The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.

Function
Resource Management
Resource Exhaustion
Remote
694
CVE-2013-4482
Untrusted search path vulnerability in Luci 0.26.0 via malicious .egg-info file

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
693
CVE-2013-5942
Graphite 0.9.5-0.9.10: Remote code execution via unsafe pickle

Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093.

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
692
CVE-2019-19875
B&R APROL allows root-level access via AprolCluster script (CVE-XXXXX)

An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. Arbitrary commands could be injected (using Python scripts) via the AprolCluster script that is invoked via sudo and thus executes with root privileges, a different vulnerability than CVE-2019-16364.

Function
Input Validation and Sanitization
Command Injection
Local
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::