VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
539
CVE-2017-16618
YAML loading in OwlMixin before 2.0.0a12 allows Python command execution due to improper use of "load" instead of "safe_load"

An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
537
CVE-2020-25489
Heap overflow in Sqreen PyMiniRacer < 0.3.0 allows remote attacks, potentially leading to heap corruption

A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption.

Function
Memory Corruption
Buffer Overflows
Remote
536
CVE-2020-15348
Python code injection in Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 via "delete_cpes_by_ids" function

Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 allows use of live/CPEManager/AXCampaignManager/delete_cpes_by_ids?cpe_ids= for eval injection of Python code.

Function
Input Validation and Sanitization
Command Injection
Remote
535
CVE-2020-13258
Contentful Python (pre-2020-05-21) reflected XSS via 'api' parameter in the-example-app.py

Contentful through 2020-05-21 for Python allows reflected XSS, as demonstrated by the api parameter to the-example-app.py.

Function
Configuration Issues
Cross-Site Scripting (XSS)
Remote
534
CVE-2020-5741
Plex Media Server on Windows: Remote code execution via Python deserialization

Deserialization of Untrusted Data in Plex Media Server on Windows allows a remote, authenticated attacker to execute arbitrary Python code.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
533
CVE-2013-4409
Eval vulnerability in Djblets 0.7.21 and Beanbag Review Board before 1.7.15 allows JSON request parsing

An eval() vulnerability exists in Python Software Foundation Djblets 0.7.21 and Beanbag Review Board before 1.7.15 when parsing JSON requests.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
532
CVE-2020-28468
Pwntools < 4.3.1 SSTI allows remote code execution

This affects the package pwntools before 4.3.1. The shellcraft generator for affected versions of this module are vulnerable to Server-Side Template Injection (SSTI), which can lead to remote code execution.

Function
Input Validation and Sanitization
Command Injection
Remote
531
CVE-2022-30286
PyScriptJS (PyScript Demonstrator) through 2022-05-04 allows remote Python source code access

pyscriptjs (aka PyScript Demonstrator) in PyScript through 2022-05-04 allows a remote user to read Python source code.

Function
Information Leakage
Information Disclosure
Remote
530
CVE-2005-3008
Tofu 0.2 Remote Python code execution via malicious pickled objects

Tofu 0.2 allows remote attackers to execute arbitrary Python code via crafted pickled objects, which Tofu unpickles and executes.

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
529
CVE-2017-16763
YAML parsing vulnerability in Confire 0.2.0 enables arbitrary Python command execution through "~/.confire.yaml"

An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::