VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
334
CVE-2015-1326
Python-dbusmock < 0.15.1 allowed malicious code execution via .pyc file in AddTemplate or spawn_server_template

python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template() method could be tricked into executing malicious code if an attacker supplies a .pyc file.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
333
CVE-2017-14483
Gentoo dev-python/flower package allows local users to kill processes through PID file manipulation

flower.initd in the Gentoo dev-python/flower package before 0.9.1-r1 for Celery Flower sets PID file ownership to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command.

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Local
330
CVE-2023-4570
NI MeasurementLink Python services have an improper access restriction, enabling nearby network attackers to access local services

An improper access restriction in NI MeasurementLink Python services could allow an attacker on an adjacent network to reach services exposed on localhost. These services were previously thought to be unreachable outside of the node. This affects measurement plug-ins written in Python using version 1.1.0 of the ni-measurementlink-service Python package and all previous versions.

Function
Design Defects
Poorly Designed Access Controls
Remote
326
CVE-2022-44053
d8s-networking for Python on PyPI version 0.1.0 had a code-execution backdoor through democritus-user-agents

The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-user-agents package. The affected version of d8s-htm is 0.1.0.

Function
Design Defects
Vulnerable and Outdated Components
Remote
323
CVE-2022-44050
d8s-networking for Python on PyPI, version 0.1.0, has a code-execution backdoor via democritus-json

The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-json package. The affected version of d8s-htm is 0.1.0.

Build/Package/Merge
Design Defects
Vulnerable and Outdated Components
Remote
317
CVE-2021-23727
Celery < 5.2.2 allows command injection via backend metadata manipulation

This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.

Timing/Serialization
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
316
CVE-2022-40429
Critical code-execution backdoor in democritus-networking v0.1.0 on PyPI

The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
313
CVE-2014-0161
oVirt Engine SDK Python <3.4.0.7 and <3.5.0.4: TLS hostname verification bypass, allowing man-in-the-middle attacks

ovirt-engine-sdk-python before 3.4.0.7 and 3.5.0.4 does not verify that the hostname of the remote endpoint matches the Common Name (CN) or subjectAltName as specified by its x.509 certificate in a TLS/SSL session. This could allow man-in-the-middle attackers to spoof remote endpoints via an arbitrary valid certificate.

Checking
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
312
CVE-2021-41250
Bypassing token filter with non-blacklisted URL

Python discord bot is the community bot for the Python Discord community. In affected versions when a non-blacklisted URL and an otherwise triggering filter token is included in the same message the token filter does not trigger. This means that by including any non-blacklisted URL moderation filters can be bypassed. This issue has been resolved in commit 67390298852513d13e0213870e50fb3cff1424e0

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
307
CVE-2022-40432
d8s-strings on PyPI: Code-execution backdoor via democritus-hypothesis 0.1.0

The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0.

Function
Design Defects
Vulnerable and Outdated Components
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::