VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
620
CVE-2022-41908
Non-UTF-8 bytestrings in TensorFlow's tf.raw_ops.PyFunc

TensorFlow is an open source platform for machine learning. An input `token` that is not a UTF-8 bytestring will trigger a `CHECK` fail in `tf.raw_ops.PyFunc`. We have patched the issue in GitHub commit 9f03a9d3bafe902c1e6beb105b2f24172f238645. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

Checking
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
619
CVE-2022-23915
Vulnerable Weblate versions (0 to 4.11.1) allow authenticated users to execute remote code via argument injection in Git or Mercurial repositories

The package weblate from 0 and before 4.11.1 are vulnerable to Remote Code Execution (RCE) via argument injection when using git or mercurial repositories. Authenticated users, can change the behavior of the application in an unintended way, leading to command execution.

Function
Input Validation and Sanitization
Command Injection
Remote
618
CVE-2021-41150
Vulnerability pre-version 0.12.0 Rust library: File overwrite via improper role name sanitization in TUF repositories

Tough provides a set of Rust libraries and tools for using and generating the update framework (TUF) repositories. The tough library, prior to 0.12.0, does not properly sanitize delegated role names when caching a repository, or when loading a repository from the filesystem. When the repository is cached or loaded, files ending with the .json extension could be overwritten with role metadata anywhere on the system. A fix is available in version 0.12.0. No workarounds to this issue are known.

Function
Input Validation and Sanitization
Path Traversal
Remote
617
CVE-2022-40896
ReDoS vulnerability in pygments 2.15.0 via SmithyLexer: Resource exhaustion with crafted input

A ReDoS issue was discovered in pygments/lexers/smithy.py in pygments through 2.15.0 via SmithyLexer.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
616
CVE-2023-33290
Git-url-parse (Rust crate through 0.4.4) vulnerable to ReDos via crafted URL

The git-url-parse crate through 0.4.4 for Rust allows Regular Expression Denial of Service (ReDos) via a crafted URL to normalize_url in lib.rs, a similar issue to CVE-2023-32758 (Python).

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
614
CVE-2015-5306
Remote code execution via OpenStack Ironic Inspector debug mode

OpenStack Ironic Inspector (aka ironic-inspector or ironic-discoverd), when debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
613
CVE-2011-4104
Django Tastypie < 0.9.10: Remote code execution via YAML deserialization

The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
612
CVE-2009-4081
Untrusted search path vulnerability in dstat (before r3199) allows local privilege escalation via a malicious Python module in the current directory

Untrusted search path vulnerability in dstat before r3199 allows local users to gain privileges via a Trojan horse Python module in the current working directory, a different vulnerability than CVE-2009-3894.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
611
CVE-2020-11073
Malicious .venv file in Autoswitch Python Virtualenv (pre-1.16.0) allows code execution

In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
610
CVE-2018-14572
Remote code execution via crafted .pickle file in conference-scheduler-cli: High-risk vulnerability

In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::