VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
549
CVE-2020-26244
OpenID Connect Python oic < 1.2.1: IdToken issues - missing signature checks, 'none' algorithm, unverified IdTokens, unchecked 'iat' claims

Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1, there are several related cryptographic issues affecting client implementations that use the library. The issues are: 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) iat claim was not checked for sanity (i.e. it could be in the future). These issues are patched in version 1.2.1.

Function
Cryptographic
Cryptographic Implementation Error
Remote
548
CVE-2019-9848
LibreOffice < 6.2.5, Arbitrary Python exec via LibreLogo

LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.

Function
Input Validation and Sanitization
Command Injection
Remote
547
CVE-2022-31516
GitHub Harveyzyh/Python repo: Path traversal via Flask send_file

The Harveyzyh/Python repository through 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.

Function
Input Validation and Sanitization
Path Traversal
Remote
546
CVE-2022-27177
Python format string vulnerability in ConsoleMe (< 1.2.2) allows info disclosure and potential remote code execution

A Python format string issue leading to information disclosure and potentially remote code execution in ConsoleMe for all versions prior to 1.2.2

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
545
CVE-2005-3291
SPE 0.7.5 allows local privilege escalation via world-writable executables

Stani's Python Editor (SPE) 0.7.5 is installed with world-writable permissions, which allows local users to gain privileges by modifying executable files.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
544
CVE-2020-5740
Plex Media Server on Windows allows local attackers to run SYSTEM-level Python code due to improper input validation

Improper Input Validation in Plex Media Server on Windows allows a local, unauthenticated attacker to execute arbitrary Python code with SYSTEM privileges.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
543
CVE-2022-45132
Linaro LAVA (before 2022.11.1) RCE via user Jinja2 template in device config validation

In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
542
CVE-2013-1630
Pyshop <0.7.1 allows code execution via insecure HTTP package downloads

pyshop before 0.7.1 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a download operation.

Function
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
541
CVE-2023-29374
LangChain 0.0.131's LLMMathChain is vulnerable to arbitrary code execution via Python exec method through prompt injection attacks

In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method.

Function
Input Validation and Sanitization
Command Injection
Remote
540
CVE-2023-36258
Arbitrary code execution in Langchain v0.0.199 via PALChain in python exec method

An issue in langchain v.0.0.199 allows an attacker to execute arbitrary code via the PALChain in the python exec method.

Function
Input Validation and Sanitization
Command Injection
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::