VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
497
CVE-2022-21195
ReDoS vulnerability in all 'url-regex' package versions.

All versions of package url-regex are vulnerable to Regular Expression Denial of Service (ReDoS) which can cause the CPU usage to crash.

Function
Input Validation and Sanitization
Command Injection
Remote
496
CVE-2022-34060
PyPI "Togglee" v0.0.8: Critical code execution backdoor

The Togglee package in PyPI version v0.0.8 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Remote
495
CVE-2015-1950
Unauthenticated access to IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 allows discovery of PowerVC credentials and access bypass for KVM guest OS users

IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code.

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Remote
494
CVE-2010-0395
User-assisted code execution in OpenOffice.org 2.x and 3.0 before 3.2.1 via a crafted ODT file

OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
493
CVE-2009-0318
Untrusted search path vulnerability in Gnumeric's Python interpreter allows local code execution with a malicious Python file in the current directory

Untrusted search path vulnerability in the GObject Python interpreter wrapper in Gnumeric allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
492
CVE-2017-2809
Ansible-vault (before 1.0.5) allows arbitrary Python command execution via crafted YAML vaults

An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
491
CVE-2016-9949
Remote code execution in Apport < 2.20.4 via manipulated CrashDB field

An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
490
CVE-2009-0315
XChat Python module arbitrary code execution via a Trojan horse Python file in the current working directory due to an untrusted search path

Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
489
CVE-2009-0314
Untrusted search path in gedit allows local code execution via a malicious Python file in the current directory

Untrusted search path vulnerability in the Python module in gedit allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

Function
Input Validation and Sanitization
Path Traversal
Local
488
CVE-2021-23393
Flask-Unchained <0.9.0 allows URL bypass via backslashes

This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.

Function
Configuration Issues
Open Redirects
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::