Python Exploits
5,903 exploits tracked across all sources.
LG Supersign Cms - Information Disclosure
LG SuperSign CMS allows reading of arbitrary files via signEzUI/playlist/edit/upload/..%2f URIs.
by Alejandro Fanjul
CVSS 8.6
NUUO NVRMini2 3.8 - 'cgi_system' Buffer Overflow (Enable Telnet)
by Jacob Baines
Netis ADSL Router DL4322D RTK 2.1.1 - DoS
Netis ADSL Router DL4322D firmware RTK 2.1.1 contains a buffer overflow vulnerability in the embedded FTP service that allows an authenticated remote user to trigger a denial of service. After logging in to the FTP service, sending an FTP command such as ABOR with an excessively long argument causes the service, and in practice the router, to crash or become unresponsive, resulting in a loss of availability for the device and connected users.
by cakes
Oracle VirtualBox Manager 5.2.18 r124319 - 'Name Attribute' Denial of Service (PoC)
by Jose Eduardo Castro
Oracle VirtualBox Manager 5.2.18 r124319 - 'Name Attribute' Denial of Service (PoC)
by Jose Eduardo Castro
XAMPP Control Panel 3.2.2 - Denial of Service (PoC)
by Gionathan Reale
XAMPP Control Panel 3.2.2 - Denial of Service (PoC)
by Gionathan Reale
Broadcom Release Automation < 6.3.0.9945 - Insecure Deserialization
Insecure deserialization of a specially crafted serialized object, in CA Release Automation 6.5 and earlier, allows attackers to potentially execute arbitrary code.
by Jakub Palaczynski
CVSS 9.8
Faleemi Plus 1.0.2 Denial of Service via Buffer Overflow
Faleemi Plus 1.0.2 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying oversized input strings. Attackers can paste a 2000-byte payload into the Camera name and DID number fields during camera addition to trigger an application crash.
by Gionathan Reale
CVSS 6.2
InfraRecorder 0.53 Denial of Service via txt File Import
InfraRecorder 0.53 contains a denial of service vulnerability that allows local attackers to crash the application by importing a maliciously crafted text file. Attackers can create a text file containing 6000 bytes of data and import it through the Edit menu's Import function to trigger an application crash.
by Gionathan Reale
CVSS 6.2
CdBurnerXP 4.5.8.6795 - 'File Name' Denial of Service (PoC)
by Alan Joaquín Baeza Meza
Free MP3 CD Ripper 2.6 - Buffer Overflow
Stack-based buffer overflow in Free MP3 CD Ripper 2.6, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted .wma file.
by Gionathan Reale
CVSS 7.8
InduSoft Web Studio 8.1 SP1 - 'Tag Name' Buffer Overflow (SEH)
by Luis Martínez
Free MP3 CD Ripper 2.6 - Buffer Overflow
Stack-based buffer overflow in Free MP3 CD Ripper 2.6, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted .mp3 file.
by Gionathan Reale
CVSS 7.8
Clone2Go Video to iPod Converter 2.5.0 - Denial of Service (PoC)
by ZwX
Socusoft Photo to Video Converter 8.07 - 'Registration Name' Buffer Overflow
by ZwX
Socusoft Photo to Video Converter 8.07 - 'Registration Name' Buffer Overflow
by ZwX
Faleemi Desktop Software 1.8.2 - 'SavePath for ScreenShots' Buffer Overflow (SEH)
by Gionathan Reale
Faleemi Desktop Software 1.8.2 - 'SavePath for ScreenShots' Buffer Overflow (SEH)
by Gionathan Reale
MediaTek Wirless Utility rt2870 - Denial of Service (PoC)
by Lawrence Amer
iCash 7.6.5 Denial of Service via Connect to Server
iCash 7.6.5 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload through the Connect to Server dialog. Attackers can paste a 7000-byte string into the Host field and click Connect to trigger an application crash.
by Gionathan Reale
CVSS 5.5
Infiltrator Network Security Scanner 4.6 Denial of Service
Infiltrator Network Security Scanner 4.6 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a 6000-byte payload into the Scan Target field and trigger a denial of service condition when the Scan button is clicked.
by Gionathan Reale
CVSS 5.5
By Source