VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
559
CVE-2019-20807
Vim < 8.1.0881: Arbitrary OS command execution via scripting, bypassing restricted mode

In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).

Function
Input Validation and Sanitization
Command Injection
Local
558
CVE-2005-2966
DIA 0.94 and earlier Python SVG import plugin: Arbitrary command execution via crafted SVG file

The Python SVG import plugin (diasvg_import.py) for DIA 0.94 and earlier allows user-assisted attackers to execute arbitrary commands via a crafted SVG file.

Function
Input Validation and Sanitization
Command Injection
Local
557
CVE-2017-1000246
Weak data encryption in pysaml2 < 4.4.0 due to IV reuse

Python package pysaml2 version 4.4.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data.

Function
Cryptographic
Weak encryption algorithm
Remote
556
CVE-2023-36188
Remote code execution in Langchain v0.0.64 via PALChain parameter in Python exec method

An issue in langchain v.0.0.64 allows a remote attacker to execute arbitrary code via the PALChain parameter in the Python exec method.

Function
Input Validation and Sanitization
Command Injection
Remote
555
CVE-2014-3593
Luci 0.26.0: Eval injection vulnerability, remote authenticated users execute Python code via crafted cluster config

Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
554
CVE-2020-25659
Python-cryptography 3.2 vulnerable to Bleichenbacher timing attacks in RSA decryption due to PKCS#1 v1.5 ciphertext timing differences

python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext.

Timing/Serialization
Cryptographic
Cryptographic Implementation Error
Remote
553
CVE-2018-12175
Intel Python 2018 default directory permissions allow privilege escalation

Default install directory permissions in Intel Distribution for Python (IDP) version 2018 may allow an unprivileged user to escalate privileges via local access.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
552
CVE-2021-23401
Flask-User URL validation bypass via backslashes, exploitable without 'autocorrect_location_header'

This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.

Function
Configuration Issues
Open Redirects
Remote
551
CVE-2022-21699
IPython: Cross-user code execution via file mismanagement

IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
550
CVE-2017-16615
YAML parsing in MLAlchemy allows arbitrary Python command execution via unsafe load usage

An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::