VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
589
CVE-2008-0982
Spyce 2.1.3 info disclosure via error message

Spyce - Python Server Pages (PSP) 2.1.3 allows remote attackers to obtain sensitive information via a direct request for spyce/examples/automaton.spy, which reveals the path in an error message.

Checking
Information Leakage
Information Disclosure
Remote
588
CVE-2020-13124
SABnzbd 2.3.9 and 3.0.0Alpha2 have a command injection vulnerability, allowing authenticated users to run arbitrary Python commands on the OS

SABnzbd 2.3.9 and 3.0.0Alpha2 has a command injection vulnerability in the web configuration interface that permits an authenticated user to execute arbitrary Python commands on the underlying operating system.

Function
Input Validation and Sanitization
Command Injection
Remote
587
CVE-2014-6448
Local users can execute Python code via shell access in vulnerable Junos OS versions before specified releases

Juniper Junos OS 13.2 before 13.2R5, 13.2X51, 13.2X52, and 13.3 before 13.3R3 allow local users to bypass intended restrictions and execute arbitrary Python code via vectors involving shell access.

Function
Input Validation and Sanitization
Command Injection
Local
586
CVE-2019-17626
ReportLab (up to v3.5.26) RCE via crafted XML color attribute

ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '<span color="' followed by arbitrary Python code.

Function
Input Validation and Sanitization
Command Injection
Remote
585
CVE-2017-9462
Remote code execution in Mercurial (before 4.1.3) via "hg serve --stdio" with "--debugger" repository name

In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name.

Function
Input Validation and Sanitization
Command Injection
Remote
584
CVE-2011-1156
Impact: Remote application crash

feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0.1 allows remote attackers to cause a denial of service (application crash) via a malformed DOCTYPE declaration.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
583
CVE-2009-2940
PyGreSQL 3.8.1 and 4.0 for Python have a security flaw with PQescapeStringConn, allowing remote attacks with multibyte encoding issues

The pygresql module 3.8.1 and 4.0 for Python does not properly support the PQescapeStringConn function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
582
CVE-2007-1657
Buffer overflow in Python 2.5 minigzip allows arbitrary code execution via long file argument

Stack-based buffer overflow in the file_compress function in minigzip (Modules/zlib) in Python 2.5 allows context-dependent attackers to execute arbitrary code via a long file argument.

Function
Memory Corruption
Buffer Overflows
Remote
581
CVE-2019-4000
Druva inSync Mac OS Client 6.5.0 allows local attackers to gain root privileges via arbitrary Python code execution

Improper neutralization of directives in dynamically evaluated code in Druva inSync Mac OS Client 6.5.0 allows a local, authenticated attacker to execute arbitrary Python expressions with root privileges.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
580
CVE-2013-5123
Python Pip < 1.5 Insecure DNS, mirroring support allows MITM attacks

The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.

Function
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::