VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
456
CVE-2014-2967
Autodesk VRED Pro 2014 (pre SR1 SP8) Python API in the integrated web server allows remote code execution via os library calls

Autodesk VRED Professional 2014 before SR1 SP8 allows remote attackers to execute arbitrary code via Python os library calls in Python API commands to the integrated web server.

Function
Input Validation and Sanitization
Command Injection
Remote
455
CVE-2019-7653
Debian python-rdflib-tools 4.2.2-1 allows code injection via CLI due to directory search vulnerability

The Debian python-rdflib-tools 4.2.2-1 package for RDFLib 4.2.2 has CLI tools that can load Python modules from the current working directory, allowing code injection, because "python -m" looks in this directory, as demonstrated by rdf2dot. This issue is specific to use of the debian/scripts directory.

Function
Input Validation and Sanitization
Command Injection
Local
454
CVE-2014-8165
Remote code execution via unsafe Python pickle usage in amsnet.py

scripts/amsvis/powerpcAMS/amsnet.py in powerpc-utils-python uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
453
CVE-2014-1934
Local symlink vulnerability in eyeD3 (python-eyed3) <= 7.0.3 and <= 0.6.18 allows arbitrary file modification via temporary file manipulation

tag.py in eyeD3 (aka python-eyed3) 7.0.3, 0.6.18, and earlier for Python allows local users to modify arbitrary files via a symlink attack on a temporary file.

Function
Input Validation and Sanitization
Path Traversal
Local
452
CVE-2008-6547
FormEncode 1.0 allows access bypass via unapplied chained_validators in schema.py

schema.py in FormEncode for Python (python-formencode) 1.0 does not apply the chained_validators feature, which allows attackers to bypass intended access restrictions via unknown vectors.

Function
Input Validation and Sanitization
Insecure Direct Object References (IDOR)
Remote
451
CVE-2022-26184
Poetry v1.1.9 and below on Windows: Untrusted search path vulnerability, allows unexpected behavior in directories with malicious content

Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.

Function
Input Validation and Sanitization
Path Traversal
Local
450
CVE-2019-1010017
Libnmap < v0.6.3: XML Injection DoS

libnmap < v0.6.3 is affected by: XML Injection. The impact is: Denial of service (DoS) by consuming resources. The component is: XML Parsing. The attack vector is: Specially crafted XML payload.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
447
CVE-2020-7655
Netius < 1.17.58: HTTP Request Smuggling due to Transfer encoding parsing error

netius prior to 1.17.58 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Transfer encoding header parsing which could allow for CL:TE or TE:TE attacks.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
446
CVE-2020-26263
RSA PKCS#1 v1.5 decryption side-channel leakage in tlslite-ng < 0.7.6 and < 0.8.0-alpha39

tlslite-ng is an open source python library that implements SSL and TLS cryptographic protocols. In tlslite-ng before versions 0.7.6 and 0.8.0-alpha39, the code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependant. In particular, the code has multiple ways in which it leaks information about the decrypted ciphertext. It aborts as soon as the plaintext doesn't start with 0x00, 0x02. All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable. This is patched in versions 0.7.6 and 0.8.0-alpha39. Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not the case (see reference). As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the security policy of tlslite-ng.

Function
Cryptographic
Cryptographic Implementation Error
Remote
445
CVE-2023-36415
Azure Identity SDK RCE: Allows remote code execution

Azure Identity SDK Remote Code Execution Vulnerability

Function
Input Validation and Sanitization
Command Injection
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::