VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
751
CVE-2011-4213
Google App Engine Python SDK < 1.5.4 sandbox os module bypass

The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent use of the os module, which allows local users to bypass intended access restrictions and execute arbitrary commands via a file_blob_storage.os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.

Function
Input Validation and Sanitization
Insecure Direct Object References (IDOR)
Local
750
CVE-2010-2235
Cobbler template API allows remote code execution via crafted kickstart templates

template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart template file, a different vulnerability than CVE-2008-6954.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
749
CVE-2020-24583
Django 2.2, 3.0, 3.1 (Python 3.7+) file upload directory permissions issue

An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.

Function
Design Defects
Security Misconfigurations
Local
748
CVE-2014-6262
Python module in RRDtool, used in Zenoss Core before 4.2.5, multiple format string vulnerabilities in rrdtool.graph function (, ZEN-15415)

Multiple format string vulnerabilities in the python module in RRDtool, as used in Zenoss Core before 4.2.5 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted third argument to the rrdtool.graph function, aka ZEN-15415, a related issue to CVE-2013-2131.

Function
Memory Corruption
Buffer Overflows
Remote
747
CVE-2019-10751
HTTPie < 1.0.3: Open Redirect allows file write

All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control.

Function
Configuration Issues
Open Redirects
Remote
746
CVE-2023-3361
OpenShift Data Science exports S3 credentials as plain text

A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.

Function
Information Leakage
Insecure Handling of Sensitive Data
Local
745
CVE-2017-9807
OpenWebif plugin (through 1.2.4) in E2 open devices allows remote code execution via eval in saveConfig function using the "key" HTTP GET parameter

An issue was discovered in the OpenWebif plugin through 1.2.4 for E2 open devices. The saveConfig function of "plugin/controllers/models/config.py" performs an eval() call on the contents of the "key" HTTP GET parameter. This allows an unauthenticated remote attacker to execute arbitrary Python code or OS commands via api/saveconfig.

Function
Input Validation and Sanitization
Command Injection
Remote
744
CVE-2013-1664
XML libraries in Python 3.4 and earlier versions are vulnerable to XML Entity Expansion (XEE) attacks, causing denial of service

The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex, Folsom, and Grizzly; Compute (Nova) Essex and Folsom; Cinder Folsom; Django; and possibly other products allow remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
743
CVE-2011-4212
Sandbox bypass via os.popen in Google App Engine Python SDK < 1.5.4

The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent os.popen calls, which allows local users to bypass intended access restrictions and execute arbitrary commands via a dev_appserver.RestrictedPathFunction._original_os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.

Function
Input Validation and Sanitization
Command Injection
Local
742
CVE-2019-15795
MD5 sum validation missing in python-apt 1.9.0ubuntu1 and earlier

python-apt only checks the MD5 sums of downloaded files in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py in version 1.9.0ubuntu1 and earlier. This allows a man-in-the-middle attack which could potentially be used to install altered packages and has been fixed in versions 1.9.0ubuntu1.2, 1.6.5ubuntu0.1, 1.1.0~beta1ubuntu0.16.04.7, 0.9.3.5ubuntu3+esm2, and 0.8.3ubuntu7.5.

Checking
Cryptographic
Unencrypted communication
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::