Python Exploits

5,916 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-8870 EXPLOITDB HIGH python VERIFIED
Mediacoderhq Audiocoder - Memory Corruption
Buffer overflow in AudioCoder 0.8.46 allows remote attackers to execute arbitrary code via a crafted .m3u file.
by Muhann4d
CVSS 7.8
CVE-2017-20229 EXPLOITDB CRITICAL python
MAWK 1.3.3-17 Stack-Based Buffer Overflow
MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can craft malicious input that overflows the stack buffer and execute a return-oriented programming chain to spawn a shell with application privileges.
by Juan Sacco
CVSS 9.8
EIP-2026-118595 EXPLOITDB python
FTPGetter 5.89.0.85 - Remote Buffer Overflow (SEH)
by Paul Purcell
CVE-2017-0144 EXPLOITDB HIGH python VERIFIED
Microsoft Server Message Block < 4.0e - Remote Code Execution
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
by sleepya
CVSS 8.8
EIP-2026-118467 EXPLOITDB python
Easy File Sharing Web Server 7.2 - GET 'PassWD' Remote Buffer Overflow (DEP Bypass)
by Sungchul Park
EIP-2026-117004 EXPLOITDB python
Counter Strike: Condition Zero - '.BSP' Map File Code Execution
by Grant Hernandez
CVE-2017-9791 EXPLOITDB CRITICAL python VERIFIED
Apache Struts 2.1.x-2.3.x - RCE
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
by Vex Woo
CVSS 9.8
EIP-2026-104740 EXPLOITDB python VERIFIED
Lepide Auditor Suite - 'createdb()' Web Console Database Injection / Remote Code Execution
by mr_me
CVE-2017-5637 EXPLOITDB HIGH python
Apache Zookeeper < 3.4.10 - Missing Authentication
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
by Brandon Dennis
CVSS 7.5
CVE-2017-18345 EXPLOITDB CRITICAL python
Joomanager < 2.0.0 - Information Disclosure
The Joomanager component through 2.0.0 for Joomla! has an arbitrary file download issue, resulting in exposing the credentials of the database via an index.php?option=com_joomanager&controller=details&task=download&path=configuration.php request.
by Luth1er
CVSS 9.8
EIP-2026-101790 EXPLOITDB python
Humax HG100R 2.0.6 - Backup File Download
by gambler
CVE-2017-20228 EXPLOITDB HIGH python
Flat Assembler 1.71.21 Stack-Based Buffer Overflow ROP
Flat Assembler 1.71.21 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying oversized input to the application. Attackers can craft malicious assembly input exceeding 5895 bytes to overwrite the instruction pointer and execute return-oriented programming chains for shell command execution.
by Juan Sacco
CVSS 8.4
EIP-2026-119365 EXPLOITDB python
Easy File Sharing Web Server 7.2 - Unrestricted File Upload
by Chako
EIP-2026-117095 EXPLOITDB python
Easy File Sharing Web Server 7.2 - Account Import Local Buffer Overflow (SEH)
by Chako
EIP-2026-118468 EXPLOITDB python
Easy File Sharing Web Server 7.2 - GET 'PassWD' Remote Buffer Overflow (SEH)
by clubjk
CVE-2017-20227 EXPLOITDB CRITICAL python
JAD 1.5.8e-1kali1 Stack-Based Buffer Overflow
JAD Java Decompiler 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying overly long input that exceeds buffer boundaries. Attackers can craft malicious input passed to the jad command to overflow the stack and execute a return-oriented programming chain that spawns a shell.
by Juan Sacco
CVSS 9.8
CVE-2017-1297 EXPLOITDB HIGH python
IBM Data Server Client - Memory Corruption
IBM DB2 for Linux, UNIX and Windows 9.2, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) is vulnerable to a stack-based buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code. IBM X-Force ID: 125159.
by defensecode
CVSS 7.3
CVE-2016-10045 EXPLOITDB CRITICAL python
PHPMailer <5.2.20 - RCE
The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
by phackt_ul
CVSS 9.8
CVE-2016-10034 EXPLOITDB CRITICAL python
Zend Mail <2.7.2 - RCE
The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address.
by phackt_ul
CVSS 9.8
CVE-2016-10033 EXPLOITDB CRITICAL python
PHPMailer Sendmail Argument Injection
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
by phackt_ul
CVSS 9.8
CVE-2016-10074 EXPLOITDB CRITICAL python
Swift Mailer <5.4.5 - RCE
The mail transport (aka Swift_Transport_MailTransport) in Swift Mailer before 5.4.5 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address in the (1) From, (2) ReturnPath, or (3) Sender header.
by phackt_ul
CVSS 9.8
EIP-2026-119167 EXPLOITDB python
SpyCamLizard 1.230 - Remote Buffer Overflow
by abatchy17
EIP-2026-103283 EXPLOITDB python
IBM Informix Dynamic Server - Code Injection / Remote Code Execution
by IMgod
CVE-2025-34096 EXPLOITDB CRITICAL python
Easy File Sharing HTTP Server 7.2 - Buffer Overflow
A stack-based buffer overflow vulnerability exists in Easy File Sharing HTTP Server version 7.2. The flaw is triggered when a crafted POST request is sent to the /sendemail.ghp endpoint containing an overly long Email parameter. The application fails to properly validate the length of this field, resulting in a memory corruption condition. An unauthenticated remote attacker can exploit this to execute arbitrary code with the privileges of the server process.
by bl4ck h4ck3r
EIP-2026-118087 EXPLOITDB python
VX Search Enterprise 9.7.18 - Local Buffer Overflow
by ScrR1pTK1dd13