VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
432
CVE-2021-41500
String comparison vulnerability in cvxopt.org <= 1.2.6 allows DoS via fake Capsule objects

Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects.

Function
Design Defects
Inadequate Error Handling
Remote
431
CVE-2013-2104
Python-keystoneclient < 0.2.4 allows authenticated users to use expired and revoked tokens

python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Remote
430
CVE-2020-26708
XXE in requests-xml v0.2.3: Allows code execution via malicious XML

requests-xml v0.2.3 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
428
CVE-2020-26709
Py-XML v1.0 XXE vulnerability allows arbitrary code execution via crafted XML

py-xml v1.0 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
427
CVE-2012-4245
Unauthenticated GIMP 2.6 Script-Fu server allows remote command execution

The scriptfu network server in GIMP 2.6 does not require authentication, which allows remote attackers to execute arbitrary commands via the python-fu-eval command.

Function
Input Validation and Sanitization
Command Injection
Remote
426
CVE-2020-11888
python-markdown2 (up to v2.3.8) XSS due to mishandling element names

python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.

Function
Configuration Issues
Cross-Site Scripting (XSS)
Remote
425
CVE-2023-31143
Mage-ai versions 0.8.34 to 0.8.71, with user authentication enabled, have unauthorized terminal access

mage-ai is an open-source data pipeline tool for transforming and integrating data. Those who use Mage starting in version 0.8.34 and prior to 0.8.72 with user authentication enabled may be affected by a vulnerability. The terminal could be accessed by users who are not signed in or do not have editor permissions. Version 0.8.72 contains a fix for this issue.

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Remote
424
CVE-2022-38792
Exotel-py v0.1.6: Backdoor code execution vulnerability

The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Remote
423
CVE-2021-25951
XXE vulnerability in 'XML2Dict' 0.2.2 = Denial of Service

XXE vulnerability in 'XML2Dict' version 0.2.2 allows an attacker to cause a denial of service.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
422
CVE-2023-41626
Gradio v3.27.0 /upload interface allows arbitrary file uploads, a severe security vulnerability

Gradio v3.27.0 was discovered to contain an arbitrary file upload vulnerability via the /upload interface.

Function
Information Leakage
Insecure Handling of Sensitive Data
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::