VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
630
CVE-2021-26551
SmartFoxServer 2.17.0 allows attackers to execute Python code via file manipulation

An issue was discovered in SmartFoxServer 2.17.0. An attacker can execute arbitrary Python code, and bypass the javashell.py protection mechanism, by creating /config/ConsoleModuleUnlock.txt and editing /config/admin/admintool.xml to enable the Console module.

Function
Input Validation and Sanitization
Command Injection
Remote
629
CVE-2020-29396
Sandboxing flaw in Odoo 11.0-13.0 enables remote authenticated users to execute arbitrary code for privilege escalation

A sandboxing issue in Odoo Community 11.0 through 13.0 and Odoo Enterprise 11.0 through 13.0, when running with Python 3.6 or later, allows remote authenticated users to execute arbitrary code, leading to privilege escalation.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Remote
628
CVE-2022-27271
InRouter 900 (before v1.0.0.r11700) RCE via python-lib due to crafted packet

InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the component python-lib. This vulnerability is triggered via a crafted packet.

Function
Input Validation and Sanitization
Command Injection
Remote
627
CVE-2021-36667
Druva inSync 6.9.0 for MacOS: Command injection allows arbitrary command execution

Command injection vulnerability in Druva inSync 6.9.0 for MacOS, allows attackers to execute arbitrary commands via crafted payload to the local HTTP server due to un-sanitized call to the python os.system library.

Function
Input Validation and Sanitization
Command Injection
Local
626
CVE-2011-4103
Django Piston 0.2.2.1 and below: Remote code execution via YAML deserialization in emitters.py

emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
625
CVE-2013-5655
Directory traversal in YingZhi Python iOS 1.9 allows remote file access

Directory traversal vulnerability in the FTP server in YingZhi Python Programming Language for iOS 1.9 allows remote attackers to read and possibly write arbitrary files via a .. (dot dot) in the default URI.

Function
Input Validation and Sanitization
Path Traversal
Remote
624
CVE-2013-5093
Graphite 0.9.5 to 0.9.10 allows remote code execution via crafted serialized objects

The renderLocalView function in render/views.py in graphite-web in Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
623
CVE-2011-4355
GDB < 7.5 privilege escalation via current directory files

GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
622
CVE-2012-2921
Python-feedparser < 5.1.2 Denial of service with crafted non-ASCII XML ENTITY in documents

Universal Feed Parser (aka feedparser or python-feedparser) before 5.1.2 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML ENTITY declaration in a non-ASCII encoded document.

Function
Resource Management
Memory Leaks
Remote
621
CVE-2020-9306
Hard-coded credentials in Tesla SolarCity Solar Monitoring Gateway (v5.46.43) .pyc file for Python user account

Tesla SolarCity Solar Monitoring Gateway through 5.46.43 has a "Use of Hard-coded Credentials" issue because Digi ConnectPort X2e uses a .pyc file to store the cleartext password for the python user account.

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::