VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
680
CVE-2011-1158
XSS in Universal Feed Parser 5.x (pre-5.0.1) via URI scheme

Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via an unexpected URI scheme, as demonstrated by a javascript: URI.

Function
Configuration Issues
Cross-Site Scripting (XSS)
Remote
679
CVE-2008-6549
Password_checker in MoinMoin 1.6.1 vulnerable to denial of service due to non-thread-safe cracklib and python-crack

The password_checker function in config/multiconfig.py in MoinMoin 1.6.1 uses the cracklib and python-crack features even though they are not thread-safe, which allows remote attackers to cause a denial of service (segmentation fault and crash) via unknown vectors.

Function
Resource Management
Resource Exhaustion
Remote
678
CVE-2020-29651
Denial of service in py.path.svnwc (python-py) 1.9.0 via malicious input in blame functionality

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

Function
Resource Management
Resource Exhaustion
Remote
677
CVE-2020-27783
XSS vulnerability in python-lxml's clean module allows remote code execution

A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
676
CVE-2020-15415
DrayTek Vigor < 1.5.1: Remote code execution via filename with text/x-python-script content type

On DrayTek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1, cgi-bin/mainfunction.cgi/cvmcfgupload allows remote command execution via shell metacharacters in a filename when the text/x-python-script content type is used, a different issue than CVE-2020-14472.

Function
Input Validation and Sanitization
Command Injection
Remote
675
CVE-2015-5216
Ipsilon 0.1.0 before 1.0.1 XSS via unescaped Python exception messages

The Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly escape certain characters in a Python exception-message template, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via an HTTP response.

Function
Configuration Issues
Cross-Site Scripting (XSS)
Remote
674
CVE-2017-12301
Cisco NX-OS: Local attacker escapes Python sandbox, gains unauthorized device OS access

A vulnerability in the Python scripting subsystem of Cisco NX-OS Software could allow an authenticated, local attacker to escape the Python parser and gain unauthorized access to the underlying operating system of the device. The vulnerability exists due to insufficient sanitization of user-supplied parameters that are passed to certain Python functions within the scripting sandbox of the affected device. An attacker could exploit this vulnerability to escape the scripting sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. To exploit this vulnerability, an attacker must have local access and be authenticated to the targeted device with administrative or Python execution privileges. These requirements could limit the possibility of a successful exploit. This vulnerability affects the following Cisco products if they are running Cisco NX-OS Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches - Standalone, NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvb86832, CSCvd86474, CSCvd86479, CSCvd86484, CSCvd86490, CSCve97102, CSCvf12757, CSCvf12804, CSCvf12815, CSCvf15198.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
673
CVE-2022-30298
Privilege vuln in FortiSOAR < 7.2.1 lets GUI user run root Python commands via file modification

An improper privilege management vulnerability [CWE-269] in Fortinet FortiSOAR before 7.2.1 allows a GUI user who has already found a way to modify system files (via another, unrelated and hypothetical exploit) to execute arbitrary Python commands as root.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
672
CVE-2012-3533
oVirt 3.1: Python SDK < 3.1.0.6 and CLI < 3.1.0.8 skip SSL certificate verification, allowing MITM attacks

The python SDK before 3.1.0.6 and CLI before 3.1.0.8 for oVirt 3.1 does not check the server SSL certificate against the client keys, which allows remote attackers to spoof a server via a man-in-the-middle (MITM) attack.

Checking
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
671
CVE-2023-26112
configobj package: Vulnerable to ReDoS in validate function with the pattern (.+?)(.โˆ—)(.โˆ—)

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\).

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::