VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
411
CVE-2022-37189
DDMAL MEI2Volpiano 0.8.2 vulnerable to XXE, DoS via unsafe XML parsing

DDMAL MEI2Volpiano 0.8.2 is vulnerable to XML External Entity (XXE), leading to a Denial of Service. This occurs due to the usage of the unsafe 'xml.etree' library to parse untrusted XML input.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
410
CVE-2021-32862
XSS in nbconvert via user notebooks

The GitHub Security Lab discovered sixteen ways to exploit a cross-site scripting vulnerability in nbconvert. When using nbconvert to generate an HTML version of a user-controllable notebook, it is possible to inject arbitrary HTML which may lead to cross-site scripting (XSS) vulnerabilities if these HTML notebooks are served by a web server (eg: nbviewer).

Function
Configuration Issues
Cross-Site Scripting (XSS)
Remote
409
CVE-2021-41945
Improper input validation in httpx < 0.23.0 allows security vulnerabilities

Encode OSS httpx < 0.23.0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
408
CVE-2022-24770
Gradio Arbitrary command execution in CSV files; fixed in v2.8.11

`gradio` is an open source framework for building interactive machine learning models and demos. Prior to version 2.8.11, `gradio` suffers from Improper Neutralization of Formula Elements in a CSV File. The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a file, then it automatically runs these commands, which could lead to arbitrary commands running on the user's computer. The problem has been patched as of `2.8.11`, which escapes the saved csv with single quotes. As a workaround, avoid opening csv files generated by `gradio` with Excel or similar spreadsheet programs.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
407
CVE-2022-0845
PyTorch Lightning < 1.6.0 code injection

Code Injection in GitHub repository pytorchlightning/pytorch-lightning prior to 1.6.0.

Function
Design Defects
Security Misconfigurations
Remote
406
CVE-2021-4118
PyTorch Lightning: Untrusted Data Deserialization Vulnerability

pytorch-lightning is vulnerable to Deserialization of Untrusted Data

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
405
CVE-2021-43831
File access vulnerability in Gradio < 2.5.0 via shared links

Gradio is an open source framework for building interactive machine learning models and demos. In versions prior to 2.5.0 there is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces. File paths are not restricted and users who receive a Gradio link can access any files on the host computer if they know the file names or file paths. This is limited only by the host operating system. Paths are opened in read only mode. The problem has been patched in gradio 2.5.0.

Function
Input Validation and Sanitization
Insecure Direct Object References (IDOR)
Remote
404
CVE-2021-43775
Path traversal vuln pre Aim 3.1.0: Unauth file system access

Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prior to 3.1.0 are vulnerable to a path traversal attack. By manipulating variables that reference files with รขโ‚ฌล“dot-dot-slash (../)รขโ‚ฌ? sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. The vulnerability issue is resolved in Aim v3.1.0.

Function
Input Validation and Sanitization
Path Traversal
Remote
403
CVE-2023-42460
Vyper _abi_decode lacks input validation, allowing bypass of bounds checking and incorrect results

Vyper is a Pythonic Smart Contract Language for the EVM. The `_abi_decode()` function does not validate input when it is nested in an expression. Uses of `_abi_decode()` can be constructed which allow for bounds checking to be bypassed resulting in incorrect results. This issue has not yet been fixed, but a fix is expected in release `0.3.10`. Users are advised to reference pull request #3626.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
402
CVE-2023-41052
Order of evaluation issue in Vyper built-in functions

Vyper is a Pythonic Smart Contract Language. In affected versions the order of evaluation of the arguments of the builtin functions `uint256_addmod`, `uint256_mulmod`, `ecadd` and `ecmul` does not follow source order. This behaviour is problematic when the evaluation of one of the arguments produces side effects that other arguments depend on. A patch is currently being developed on pull request #3583. When using builtins from the list above, users should make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::