VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
229
CVE-2020-27589
SSL certificate validation issue in Synopsys hub-rest-api-python 0.0.25 to 0.0.52: Security risk

Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 - 0.0.52 does not validate SSL certificates in certain cases.

Function
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
228
CVE-2023-34233
Snowflake Connector for Python < 3.0.2 vulnerable to SSO URL command injection

The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Versions prior to 3.0.2 are vulnerable to command injection via single sign-on(SSO) browser URL authentication. In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the userโ€™s local machine would render the malicious payload, leading to a remote code execution. This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources. Version 3.0.2 contains a patch for this issue.

Function
Input Validation and Sanitization
Command Injection
Remote
226
CVE-2022-42965
Python-libnmap <=0.7.2: Remote command execution due to argument validation flaw

An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the snowflake-connector-python PyPI package, when an attacker is able to supply arbitrary input to the undocumented get_file_transfer_type method

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
225
CVE-2023-40587
Exponential ReDoS in Snowflake-Connector-Python via get_file_transfer_type method

Pyramid is an open source Python web framework. A path traversal vulnerability in Pyramid versions 2.0.0 and 2.0.1 impacts users of Python 3.11 that are using a Pyramid static view with a full filesystem path and have a `index.html` file that is located exactly one directory above the location of the static view's file system path. No further path traversal exists, and the only file that could be disclosed accidentally is `index.html`. Pyramid version 2.0.2 rejects any path that contains a null-byte out of caution. While valid in directory/file names, we would strongly consider it a mistake to use null-bytes in naming files/directories. Secondly, Python 3.11, and 3.12 has fixed the underlying issue in `os.path.normpath` to no longer truncate on the first `0x00` found, returning the behavior to pre-3.11 Python, un an as of yet unreleased version. Fixes will be available in:Python 3.12.0rc2 and 3.11.5. Some workarounds are available. Use a version of Python 3 that is not affected, downgrade to Python 3.10 series temporarily, or wait until Python 3.11.5 is released and upgrade to the latest version of Python 3.11 series.

Function
Input Validation and Sanitization
Path Traversal
Local
223
CVE-2022-40899
Python Charmers Future 0.18.2 and earlier: DoS via malicious Set-Cookie header

An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
222
CVE-2021-43572
Python Charmers Future 0.18.2 and earlier: Remote attacker causes denial of service via malicious Set-Cookie header

The verify function in the Stark Bank Python ECDSA library (aka starkbank-escada or ecdsa-python) before 2.0.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.

Checking
Cryptographic
Cryptographic Implementation Error
Remote
221
CVE-2022-44049
Stark Bank Python ECDSA <2.0.1 allows signature forgery by not checking non-zero signatures

The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-grammars package. The affected version of d8s-htm is 0.1.0.

Function
Design Defects
Vulnerable and Outdated Components
Remote
220
CVE-2022-43305
PyPI d8s-python package v0.1.0 had a backdoor via democritus-grammars

The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-algorithms package. The affected version of d8s-htm is 0.1.0.

Function
Design Defects
Vulnerable and Outdated Components
Remote
218
CVE-2020-15141
Openapi-python-client < 0.5.3 allows malicious files anywhere on disk

In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.

Function
Input Validation and Sanitization
Path Traversal
Local
217
CVE-2022-38887
PyPI package 'd8s-python' version 0.1.0 contains a code-execution backdoor via 'democritus-algorithms'

The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The democritus-strings package. The affected version is 0.1.0.

Function
Design Defects
Vulnerable and Outdated Components
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::