VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
650
CVE-2014-1929
Python-gnupg 0.3.5 and 0.3.6 allow unspecified impact via option injection in positional arguments

python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
649
CVE-2012-4406
OpenStack Swift < 1.7.0: Remote code execution via crafted pickle metadata in memcached

OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
648
CVE-2007-5741
Remote code execution in Plone 2.5.0 - 2.5.4 and 3.0.0 - 3.0.2 via pickled objects in network data

Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes.

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
647
CVE-2005-2483
Karrigell < 2.1.8 has remote code execution via eval injection in manipulated script arguments

Eval injection vulnerability in Karrigell before 2.1.8 allows remote attackers to execute arbitrary Python code via modified arguments to a Karrigell services (.ks) script, which can reference functions from libraries that are used by that script.

Function
Configuration Issues
Remote File Inclusion (RFI)
Remote
646
CVE-2022-26032
Local privilege escalation in Intel Python < 2022.1 due to uncontrolled search path element

Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
645
CVE-2018-7889
Calibre 3.18: Remote code execution via crafted .pickle file

gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
644
CVE-2014-2331
Check_MK versions 1.2.2p2, 1.2.2p3, and 1.2.3i5 allow remote authenticated users to execute arbitrary Python code via a crafted rules.mk file

Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.

Function
Input Validation and Sanitization
Command Injection
Remote
643
CVE-2014-5340
Remote code execution via pickle flaw in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
642
CVE-2013-6491
OpenStack Oslo (before 2013.2): python-qpid client, qpid_protocol=ssl, exposes sensitive data via unsecured network sniffing

The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.

Function
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
641
CVE-2008-0981
Open redirect vulnerability in Spyce 2.1.3 allows phishing via a malicious "url" parameter

Open redirect vulnerability in spyce/examples/redirect.spy in Spyce - Python Server Pages (PSP) 2.1.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.

Function
Configuration Issues
Open Redirects
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::