VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
1026
CVE-2015-6938
IPython/Jupyter Notebook 3.2.2 and 4.0.x File Browser XSS.

Cross-site scripting (XSS) vulnerability in the file browser in notebook/notebookapp.py in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via a folder name. NOTE: this was originally reported as a cross-site request forgery (CSRF) vulnerability, but this may be inaccurate.

Checking
Configuration Issues
Cross-Site Scripting (XSS)
Remote
1025
CVE-2015-4706
IPython 3.x < 3.2 XSS in /api/contents

Cross-site scripting (XSS) vulnerability in IPython 3.x before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/contents path.

Checking
Configuration Issues
Cross-Site Scripting (XSS)
Remote
1024
CVE-2015-4707
IPython < 3.2 XSS in /api/notebooks

Cross-site scripting (XSS) vulnerability in IPython before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/notebooks path.

Checking
Configuration Issues
Cross-Site Scripting (XSS)
Remote
1023
CVE-2015-5607
IPython 2/3 REST API Cross-Site Request Forgery

Cross-site request forgery in the REST API in IPython 2 and 3.

Checking
Configuration Issues
Cross-Site Request Forgery (CSRF)
Remote
1022
CVE-2015-7337
IPython/Jupyter Notebook 3.2.2 and 4.0.x JavaScript Code Execution

The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.

Build/Package/Merge
Configuration Issues
Cross-Site Scripting (XSS)
Remote
1021
CVE-2015-7828
SAP HANA Database < 1.00 SPS10 Unauthenticated Code Execution

SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583.

Function
Authentication, Authorization, and Session Management
Insecure Authentication Mechanisms
Remote
1020
CVE-2011-4954
Cobbler Privilege Escalation via PYTHON_EGG_CACHE

cobbler has local privilege escalation via the use of insecure location for PYTHON_EGG_CACHE

Build/Package/Merge
Authentication, Authorization, and Session Management
Privilege Escalation
Local
1019
CVE-2011-4783
IDAPython Plugin < 1.5.2.3 Arbitrary Code Execution

The IDAPython plugin before 1.5.2.3 in IDA Pro allows user-assisted remote attackers to execute arbitrary code via a crafted IDB file, related to improper handling of certain swig_runtime_data files in the current working directory.

Algorithm
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
1018
CVE-2014-3429
IPython Notebook 0.12-1.x WebSocket Origin Validation Bypass

IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.

Interface
Configuration Issues
Cross-Site Request Forgery (CSRF)
Remote
1017
CVE-2006-1095
Mod_python 3.2.7 Directory Traversal Vulnerability

Directory traversal vulnerability in the FileSession object in Mod_python module 3.2.7 for Apache allows local users to execute arbitrary code via a crafted session cookie.

Build/Package/Merge
Input Validation and Sanitization
Path Traversal
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::