VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
466
CVE-2012-5493
Remote authenticated user bypasses Python sandbox to execute arbitrary code in Plone < 4.2.3 and < 4.3 beta 1

gtbn.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain permissions to bypass the Python sandbox and execute arbitrary Python code via unspecified vectors.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
465
CVE-2008-6954
Remote code execution via Cheetah kickstart template in Cobbler < 1.2.9

The web interface (CobblerWeb) in Cobbler before 1.2.9 allows remote authenticated users to execute arbitrary Python code in cobblerd by editing a Cheetah kickstart template to import arbitrary Python modules.

Function
Input Validation and Sanitization
Command Injection
Remote
464
CVE-2021-25322
Local attacker escalates privileges via symbolic link vulnerability in python-HyperKitty on openSUSE Leap 15.2 and Factory

A UNIX Symbolic Link (Symlink) Following vulnerability in python-HyperKitty of openSUSE Leap 15.2, Factory allows local attackers to escalate privileges from the user hyperkitty or hyperkitty-admin to root. This issue affects: openSUSE Leap 15.2 python-HyperKitty version 1.3.2-lp152.2.3.1 and prior versions. openSUSE Factory python-HyperKitty versions prior to 1.3.4-5.1.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
463
CVE-2021-31997
UNIX Symlink vulnerability in python-postorius on openSUSE Leap 15.2 and Factory allows local attackers to escalate privileges from user to root

A UNIX Symbolic Link (Symlink) Following vulnerability in python-postorius of openSUSE Leap 15.2, Factory allows local attackers to escalate from users postorius or postorius-admin to root. This issue affects: openSUSE Leap 15.2 python-postorius version 1.3.2-lp152.1.2 and prior versions. openSUSE Factory python-postorius version 1.3.4-2.1 and prior versions.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
462
CVE-2020-7695
Uvicorn <0.11.7 vulnerable to HTTP response splitting

Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
461
CVE-2020-7694
uvicorn package: ANSI escape sequence injection via crafted URLs in request logging

This affects all versions of package uvicorn. The request logger provided by the package is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-encoded escape sequences, the logging component will log the URL after it's been processed with urllib.parse.unquote, therefore converting any percent-encoded characters into their single-character equivalent, which can have special meaning in terminal emulators. By requesting URLs with crafted paths, attackers can: * Pollute uvicorn's access logs, therefore jeopardising the integrity of such files. * Use ANSI sequence codes to attempt to interact with the terminal emulator that's displaying the logs (either in real time or from a file).

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
460
CVE-2020-16977
Remote code execution in Visual Studio Code Python extension via Jupyter notebook file load

A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads a Jupyter notebook file, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'.

Function
Input Validation and Sanitization
Command Injection
Remote
459
CVE-2023-25601
Apache DolphinScheduler 3.0.0-3.1.1: Unauthorized socket attacks. Fixed in 3.1.2

On version 3.0.0 through 3.1.1, Apache DolphinScheduler's python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above.

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Local
458
CVE-2016-9910
Pre-0.99999999 HTML5lib XSS issue: mishandling attribute values

The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of special characters in attribute values, a different vulnerability than CVE-2016-9909.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
457
CVE-2016-9909
HTML5lib <0.99999999 XSS via '<' in attribute values

The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of the < (less than) character in attribute values.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::