VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
306
CVE-2022-40431
PyPI d8s-pdfs Python package (v0.1.0) had a code-execution backdoor inserted by a third party

The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
303
CVE-2022-40425
d8s-html for Python (PyPI 0.1.0) had a code-execution backdoor through democritus-networking package

The d8s-html for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
300
CVE-2022-38884
PyPI d8s-grammars v0.1.0 had a backdoor via democritus-strings, allowing code execution

The d8s-grammars for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0.

Function
Design Defects
Vulnerable and Outdated Components
Remote
295
CVE-2022-41382
d8s-json (v0.1.0) on PyPI had code-execution backdoor through democritus-file-system

The d8s-json package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
292
CVE-2013-5106
PyPI package "d8s-asns" v0.1.0 had a code-execution backdoor ("democritus-csv") added by an unauthorized party

A Code Execution vulnerability exists in select.py when using python-mode 2012-12-19.

Function
Input Validation and Sanitization
Command Injection
Remote
291
CVE-2022-42042
Python d8s-urls package (PyPI) version 0.1.0 has a code-execution backdoor through democritus-csv package

The d8s-networking package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hashes package. The affected version is 0.1.0.

Build/Package/Merge
Design Defects
Vulnerable and Outdated Components
Remote
280
CVE-2022-40805
Python 0.1.0 on PyPI had a code-execution backdoor via democritus-hypothesis in d8s-urls

The d8s-urls for python 0.1.0, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-hypothesis package.

Function
Input Validation and Sanitization
Command Injection
Remote
279
CVE-2022-40428
d8s-mpeg Python package v0.1.0 had code-execution backdoor via democritus-networking

The d8s-mpeg for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
277
CVE-2022-40810
PyPI d8s-ip-addresses 0.1.0 had a code-execution backdoor via democritus-hypothesis

The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
273
CVE-2022-40808
PyPI package "d8s-dates" version 0.1.0 had a code-execution backdoor via "democritus-hypothesis.

The d8s-dates for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::