VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
1100
CVE-2024-37014
Remote code execution via untrusted access to custom_component endpoint.

Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.

Function
Input Validation and Sanitization
Command Injection
Remote
1099
CVE-2024-43404
Remote code execution vulnerability in MEGABOT's `/math` command.

MEGABOT is a fully customized Discord bot for learning and fun. The `/math` command and functionality of MEGABOT versions < 1.5.0 contains a remote code execution vulnerability due to a Python `eval()`. The vulnerability allows an attacker to inject Python code into the `expression` parameter when using `/math` in any Discord channel. This vulnerability impacts any discord guild utilizing MEGABOT. This vulnerability was fixed in release version 1.5.0.

Function
Input Validation and Sanitization
Command Injection
Remote
1098
CVE-2024-35060
YAML library vulnerability in NASA AIT-Core v2.5.2 allows command execution.

An issue in the YAML Python library of NASA AIT-Core v2.5.2 allows attackers to execute arbitrary commands via supplying a crafted YAML file.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Local
1097
CVE-2024-21503
ReDoS vulnerability in Black prior to 24.3.0 via leading tabs in input.

Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.

Algorithm
Input Validation and Sanitization
None
Remote
1096
CVE-2024-49766
Werkzeug unsafe path handling on Windows with Python < 3.11 allows data access.

Werkzeug is a Web Server Gateway Interface web application library. On Python < 3.11 on Windows, os.path.isabs() does not catch UNC paths like //server/share. Werkzeug's safe_join() relies on this check, and so can produce a path that is not safe, potentially allowing unintended access to data. Applications using Python >= 3.11, or not using Windows, are not vulnerable. Werkzeug version 3.0.6 contains a patch.

Function
Input Validation and Sanitization
Path Traversal
Remote
1095
CVE-2024-6891
Python code injection vulnerability during login with valid credentials.

Attackers with a valid username and password can exploit a python code injection vulnerability during the natural login flow.

Interface
Input Validation and Sanitization
Command Injection
Remote
1094
CVE-2024-23346
Critical vulnerability in Pymatgen allows arbitrary code execution via eval().

Pymatgen (Python Materials Genomics) is an open-source Python library for materials analysis. A critical security vulnerability exists in the `JonesFaithfulTransformation.from_transformation_str()` method within the `pymatgen` library prior to version 2024.2.20. This method insecurely utilizes `eval()` for processing input, enabling execution of arbitrary code when parsing untrusted input. Version 2024.2.20 fixes this issue.

Checking
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
1093
CVE-2024-35059
Arbitrary command execution vulnerability in NASA AIT-Core's Pickle library.

An issue in the Pickle Python library of NASA AIT-Core v2.5.2 allows attackers to execute arbitrary commands.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
1092
CVE-2024-35255
Elevation of privilege vulnerability in Azure Identity and MS Authentication libraries.

Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability

Function
Authentication, Authorization, and Session Management
Privilege Escalation
Remote
1091
CVE-2024-50636
PyMOL 2.5.0 allows RCE via unvalidated Python code in .PYM files.

PyMOL 2.5.0 contains a vulnerability in its "Run Script" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application.

Checking
Input Validation and Sanitization
Command Injection
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::