VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
508
CVE-2015-0692
WSA 8.5.0-ise-147 allows local users to execute arbitrary Python code via crafted serialized objects

Cisco Web Security Appliance (WSA) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle Python module during certain tunnel-status checks, which allows local users to execute arbitrary Python code and gain privileges via crafted serialized objects, aka Bug ID CSCut39230.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
507
CVE-2014-0472
Django <1.4.11, <1.5.6, <1.6.3, and <1.7 beta 2: Remote code execution in reverse function from user input

The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 allows remote attackers to import and execute arbitrary Python modules by leveraging a view that constructs URLs using user input and a "dotted Python path."

Function
Configuration Issues
Remote File Inclusion (RFI)
Remote
506
CVE-2008-5987
Untrusted search path vulnerability in Eye of GNOME (eog) 2.22.3 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory

Untrusted search path vulnerability in the Python interface in Eye of GNOME (eog) 2.22.3, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

Function
Design Defects
Security Misconfigurations
Local
505
CVE-2022-42268
USD files in Omniverse Kit allow malicious Python code execution, risking data breaches, tampering, and denial of service

Omniverse Kit contains a vulnerability in the reference applications Create, Audio2Face, Isaac Sim, View, Code, and Machinima. These applications allow executable Python code to be embedded in Universal Scene Description (USD) files to customize all aspects of a scene. If a user opens a USD file that contains embedded Python code in one of these applications, the embedded Python code automatically runs with the privileges of the user who opened the file. As a result, an unprivileged remote attacker could craft a USD file containing malicious Python code and persuade a local user to open the file, which may lead to information disclosure, data tampering, and denial of service.

Function
Information Leakage
Information Disclosure
Remote
504
CVE-2013-5654
YingZhi Python v1.9 allows arbitrary anonymous uploads to phone storage - Security vulnerability

Vulnerability in YingZhi Python Programming Language v1.9 allows arbitrary anonymous uploads to the phone's storage

Function
Input Validation and Sanitization
Insecure Direct Object References (IDOR)
Remote
502
CVE-2008-5985
Python interface in Epiphany 2.22.3 and other versions allows arbitrary code execution by local users via a malicious Python file

Untrusted search path vulnerability in the Python interface in Epiphany 2.22.3, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
501
CVE-2008-5984
Untrusted search path in Dia 0.96.1 allows local users to execute arbitrary code via a malicious Python file

Untrusted search path vulnerability in the Python plugin in Dia 0.96.1, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
500
CVE-2020-10799
SVGlib (through 0.9.3) in Python is vulnerable to XXE attacks via svg2rlg

The svglib package through 0.9.3 for Python allows XXE attacks via an svg2rlg call.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
499
CVE-2017-16764
YAML parsing in Django_make_app 0.1.3 allows arbitrary Python command execution

An exploitable vulnerability exists in the YAML parsing functionality in the read_yaml_file method in io_utils.py in django_make_app 0.1.3. A YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
498
CVE-2002-0131
ActivePython ActiveX control in AXScript allows remote file reading in Internet Explorer due to security flaws

ActivePython ActiveX control for Python in the AXScript package, when used in Internet Explorer, does not prevent a script from reading files from the client's filesystem, which allows remote attackers to read arbitrary files via a malicious web page containing Python script.

Function
Input Validation and Sanitization
Path Traversal
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::