VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
476
CVE-2021-32807
Remote code execution in Zope via AccessControl v4 and v5

The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects. The policies defined in `AccessControl` severely restrict access to Python modules and only exempt a few that are deemed safe, such as Python's `string` module. However, full access to the `string` module also allows access to the class `Formatter`, which can be overridden and extended within `Script (Python)` in a way that provides access to other unsafe Python libraries. Those unsafe Python libraries can be used for remote code execution. By default, you need to have the admin-level Zope "Manager" role to add or edit `Script (Python)` objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk. The problem has been fixed in AccessControl 4.3 and 5.2. Only AccessControl versions 4 and 5 are vulnerable, and only on Python 3, not Python 2.7. As a workaround, a site administrator can restrict adding/editing `Script (Python)` objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.

Function
Design Defects
Poorly Designed Access Controls
Remote
475
CVE-2013-4867
EA Karotz Smart Rabbit 12.07.19.00 Python module hijacking

Electronic Arts Karotz Smart Rabbit 12.07.19.00 allows Python module hijacking

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
474
CVE-2014-8650
Python-requests-Kerberos 0.5 has a vulnerability lacking mutual authentication support

python-requests-Kerberos through 0.5 does not handle mutual authentication

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Remote
473
CVE-2014-7143
Python Twisted 14.0 HTTP client ignores trustRoot, causing a security vulnerability

Python Twisted 14.0 trustRoot is not respected in HTTP client

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Remote
472
CVE-2008-5986
Untrusted search path in Csound 5.08.2 allows local users to execute arbitrary code via a malicious Python file in the current directory

Untrusted search path vulnerability in the (1) "VST plugin with Python scripting" and (2) "VST plugin for writing score generators in Python" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

Function
Input Validation and Sanitization
Path Traversal
Local
471
CVE-2019-17019
Firefox < 72 on Windows allows Python files served as text/plain to be executed instead of opened (security vulnerability)

When Python was installed on Windows, a python file being served with the MIME type of text/plain could be executed by Python instead of being opened as a text file when the Open option was selected upon download. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 72.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
470
CVE-2015-1341
Python module import vulnerability in Apport < 2.19.2 via command line argument

Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.

Checking
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
469
CVE-2019-18874
psutil (python-psutil) <= 5.6.5: Double-free vulnerability due to refcount mishandling in system data conversion

psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.

Function
Memory Corruption
Use-After-Free Errors
Remote
468
CVE-2014-1938
Python-rply < 0.7.4 insecurely creates temporary files

python-rply before 0.7.4 insecurely creates temporary files.

Function
Information Leakage
Insecure Handling of Sensitive Data
Local
467
CVE-2009-5042
python-docutils insecure temporary files

python-docutils allows insecure usage of temporary files

Function
Information Leakage
Insecure Handling of Sensitive Data
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::