VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
528
CVE-2017-16616
YAML parsing vulnerability in PyAnyAPI (before 0.6.1): Arbitrary Python command execution due to "load" instead of "safe_load"

An exploitable vulnerability exists in the YAML parsing functionality in the YAMLParser method in Interfaces.py in PyAnyAPI before 0.6.1. A YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
527
CVE-2008-4394
Untrusted search path vuln in Portage < 2.1.4.5 lets local users run code via manipulated Python modules in certain ebuilds

Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.

Function
Input Validation and Sanitization
Insecure Direct Object References (IDOR)
Local
526
CVE-2020-13144
Arbitrary code execution in Open edX Ironwood 2.5 without CodeJail: Critical security flaw

Studio in Open edX Ironwood 2.5, when CodeJail is not used, allows a user to go to the "Create New course>New section>New subsection>New unit>Add new component>Problem button>Advanced tab>Custom Python evaluated code" screen, edit the problem, and execute Python code. This leads to arbitrary code execution.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
525
CVE-2019-17664
Untrusted search path in Ghidra 9.0.4 allows code execution via cmd.exe

NSA Ghidra through 9.0.4 uses a potentially untrusted search path. When executing Ghidra from a given path, the Java process working directory is set to this path. Then, when launching the Python interpreter via the "Ghidra Codebrowser > Window > Python" option, Ghidra will try to execute the cmd.exe program from this working directory.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
524
CVE-2021-23404
SQLite-web CSRF attacks due to lack of source validation in SQL dashboard

This affects all versions of package sqlite-web. The SQL dashboard area allows sensitive actions to be performed without validating that the request originated from the application. This could enable an attacker to trick a user into performing these actions unknowingly through a Cross Site Request Forgery (CSRF) attack.

Checking
Configuration Issues
Cross-Site Request Forgery (CSRF)
Remote
523
CVE-2020-28736
XXE vulnerability in Plone 5.2.3: Allows XXE attacks via unapplied permission in plone.schemaeditor.ManageSchemata, limited to Manager role

Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).

Function
Input Validation and Sanitization
Insecure Direct Object References (IDOR)
Remote
522
CVE-2020-28735
Plone < 5.2.3 SSRF via Manager tracebacks

Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role).

Function
Configuration Issues
Server-Side Request Forgery (SSRF)
Remote
521
CVE-2020-28734
Plone < 5.2.3, XXE vuln, Manager role

Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
520
CVE-2021-29421
Pikepdf 1.3.0 to 2.9.2: XXE in XMP metadata

models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
519
CVE-2015-5159
Python-kdcproxy < 0.3.2 allows remote DoS via large POST request

python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request.

Function
Resource Management
Resource Exhaustion
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::