VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
189
CVE-2010-3493
Denial of Service in smtpd.py

Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7, 3.1, and 3.2 alpha allow remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, or the getpeername function having an ENOTCONN error, a related issue to CVE-2010-3492.

Timing/Serialization
Race Conditions
Race Condition in File Operations
Remote
179
CVE-2012-2135
utf-16 Decoder Vulnerability in Python 3.1 through 3.3

The utf-16 decoder in Python 3.1 through 3.3 does not update the aligned_end variable after calling the unicode_decode_call_errorhandler function, which allows remote attackers to obtain sensitive information (process memory) or cause a denial of service (memory corruption and crash) via unspecified vectors.

Assignment
Memory Corruption
Out-of-Bound Accesses
Remote
175
CVE-2012-5578
Insecure permissions in Python keyring

Python keyring has insecure permissions on new databases allowing world-readable files to be created

Assignment
Design Defects
Security Misconfigurations
Local
169
CVE-2013-4238
SSL Spoofing Vulnerability in Python

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Checking
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
168
CVE-2013-7040
Denial of Service in Python Hash Collision Handling

Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.

Algorithm
Cryptographic
Inadequate random number generation
Local
166
CVE-2013-7440
SSL Wildcard Spoofing in CPython

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

Checking
Cryptographic
Improper SSL/TLS Certificate Validation
Remote
162
CVE-2014-1829
Sensitive Information Disclosure in Python Requests

Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.

Interface
Information Leakage
Insecure Handling of Sensitive Data
Remote
161
CVE-2014-1830
Sensitive Information Exposure in Python Requests

Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by reading the Proxy-Authorization header in a redirected request.

Interface
Information Leakage
Insecure Handling of Sensitive Data
Remote
158
CVE-2014-1933
Symlink Attack Vulnerability in Python Image Library (PIL) 1.1.7

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 use the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.

Interface
Race Conditions
Race Condition in File Operations
Local
152
CVE-2014-4650
Path Traversal Vulnerability

The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.

Algorithm
Input Validation and Sanitization
Path Traversal
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::