VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
640
CVE-2019-10633
Zyxel NAS 326 v5.21 and below: Remote code execution via eval injection

An eval injection vulnerability in the Python web server routing on the Zyxel NAS 326 version 5.21 and below allows a remote authenticated attacker to execute arbitrary code via the tjp6jp6y4, simZysh, and ck6fup6 APIs.

Function
Input Validation and Sanitization
Command Injection
Remote
639
CVE-2021-21236
CairoSVG < 2.5.1: Vulnerable to SVG REDoS

CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo. In CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability. When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. This is fixed in version 2.5.1. See Referenced GitHub advisory for more information.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
638
CVE-2020-10289
Unsafe YAML load in ROS actionlib allows arbitrary Python object instantiation, enabling potential code execution by attackers

Use of unsafe yaml load. Allows instantiation of arbitrary objects. The flaw itself is caused by an unsafe parsing of YAML values which happens whenever an action message is processed to be sent, and allows for the creation of Python objects. Through this flaw in the ROS core package of actionlib, an attacker with local or remote access can make the ROS Master, execute arbitrary code in Python form. Consider yaml.safe_load() instead. Located first in actionlib/tools/library.py:132. See links for more info on the bug.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
637
CVE-2022-42969
Python py library <= 1.11.0 vulnerable to remote ReDoS via mishandled InfoSvnCommand argument in Subversion info data

The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
636
CVE-2022-42038
PyPI package d8s-ip-addresses had code-execution backdoor via democritus-csv v0.1.0

The d8s-ip-addresses package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-csv package. The affected version is 0.1.0.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
635
CVE-2021-44255
Remote code execution via malicious configuration backup

Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
634
CVE-2015-5242
OpenStack Swift-on-File allows remote users to execute arbitrary code via crafted extended attributes

OpenStack Swift-on-File (aka Swiftonfile) does not properly restrict use of the pickle Python module when loading metadata, which allows remote authenticated users to execute arbitrary code via a crafted extended attribute (xattrs).

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
633
CVE-2011-1157
XSS in Universal Feed Parser 5.x < 5.0.1 via malformed XML comments

Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via malformed XML comments.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
632
CVE-2009-5065
XSS vulnerability in feedparser.py < 5.0 allows remote script injection via nested CDATA

Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0 allows remote attackers to inject arbitrary web script or HTML via vectors involving nested CDATA stanzas.

Function
Configuration Issues
Cross-Site Scripting (XSS)
Remote
631
CVE-2009-0668
ZODB < 3.8.2 with ZEO: Remote code execution

Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol.

Function
Input Validation and Sanitization
Command Injection
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::