Python Exploits

5,916 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-20220 EXPLOITDB HIGH python
Serviio PRO 1.8 Unauthenticated Password Change via REST API
Serviio PRO 1.8 contains an improper access control vulnerability in the Configuration REST API that allows unauthenticated attackers to change the mediabrowser login password. Attackers can send specially crafted requests to the REST API endpoints to modify credentials without authentication.
by LiquidWorm
CVSS 7.5
CVE-2017-20217 EXPLOITDB HIGH python
Serviio PRO 1.8 REST API Information Disclosure
Serviio PRO 1.8 contains an information disclosure vulnerability due to improper access control enforcement in the Configuration REST API that allows unauthenticated attackers to access sensitive information. Remote attackers can send specially crafted requests to the REST API endpoints to retrieve potentially sensitive configuration data without authentication.
by LiquidWorm
CVSS 7.5
EIP-2026-119423 EXPLOITDB python
Serviio PRO 1.8 DLNA Media Streaming Server - REST API Arbitrary Code Execution
by LiquidWorm
EIP-2026-103890 EXPLOITDB python
Dahua Generation 2/3 - Backdoor Access
by bashis
CVE-2017-3599 EXPLOITDB HIGH python VERIFIED
MySQL Server <5.6.35, <5.7.17 - DoS
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue is an integer overflow in sql/auth/sql_authentication.cc which allows remote attackers to cause a denial of service via a crafted authentication packet.
by Rodrigo Marcos
CVSS 7.5
EIP-2026-103258 EXPLOITDB python
Alerton Webtalk 2.5/3.3 - Multiple Vulnerabilities
by David Tomaschik
EIP-2026-115470 EXPLOITDB python VERIFIED
IrfanView 4.44 - Denial of Service
by Dreivan Orprecio
EIP-2026-112838 EXPLOITDB python
TYPO3 Extension News - SQL Injection
by Charles Fol
EIP-2026-112092 EXPLOITDB python
Simple File Uploader - Arbitrary File Download
by Daniel Godoy
CVE-2017-7720 EXPLOITDB HIGH python VERIFIED
PrivateTunnel 2.7-2.8 - Buffer Overflow
Buffer overflow in PrivateTunnel 2.7 and 2.8 allows local attackers to cause a denial of service (SEH overwrite) or possibly have unspecified other impact via a long password.
by Muhann4d
CVSS 7.8
EIP-2026-118874 EXPLOITDB python
Microsoft Windows 2003 SP2 - 'ERRATICGOPHER' SMB Remote Code Execution
by vportal
EIP-2026-117025 EXPLOITDB python
Dell Customer Connect 1.3.28.0 - Local Privilege Escalation
by Kacper Szurek
CVE-2017-7221 EXPLOITDB HIGH python
OpenText Documentum Content Server - SQL Injection
OpenText Documentum Content Server has an inadequate protection mechanism against SQL injection, which allows remote authenticated users to execute arbitrary code with super-user privileges by leveraging the availability of the dm_bp_transition docbase method with a user-created dm_procedure object, as demonstrated by use of a backspace character in an injected string. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2513.
by Andrey B. Panfilov
CVSS 8.8
EIP-2026-103294 EXPLOITDB python
LogRhythm Network Monitor - Authentication Bypass / Command Injection
by Francesco Oddo
CVE-2017-0199 EXPLOITDB HIGH python
Microsoft Office Word Malicious Hta Execution
Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."
by Bhadresh Patel
CVSS 7.8
CVE-2017-3881 EXPLOITDB CRITICAL python
Cisco - RCE
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
by Artem Kondratenko
CVSS 9.8
CVE-2017-3881 EXPLOITDB CRITICAL python
Cisco - RCE
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
by Artem Kondratenko
CVSS 9.8
CVE-2017-6554 EXPLOITDB HIGH python
Quest Privilege Manager - Improper Input Validation
pmmasterd in Quest Privilege Manager before 6.0.0.061, when configured as a policy server, allows remote attackers to write to arbitrary files and consequently execute arbitrary code with root privileges via an ACT_NEWFILESENT action.
by m0t
CVSS 7.2
CVE-2017-14459 EXPLOITDB CRITICAL python
Moxa AWK-3131A <1.7 - OS Command Injection
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
by Talos
CVSS 10.0
EIP-2026-102896 EXPLOITDB python
Linux Kernel (PonyOS 4.0) - 'fluttershy' LD_LIBRARY_PATH Local Privilege Escalation
by Hacker Fantastic
CVE-2017-7310 EXPLOITDB HIGH python VERIFIED
SyncBreeze <10.6 - Buffer Overflow
A buffer overflow vulnerability in Import Command in SyncBreeze before 10.6, DiskSorter before 10.6, DiskBoss before 8.9, DiskPulse before 10.6, DiskSavvy before 10.6, DupScout before 10.6, and VX Search before 10.6 allows attackers to execute arbitrary code via a crafted XML file containing a long name attribute of a classify element.
by Daniel Teixeira
CVSS 7.8
CVE-2017-7310 EXPLOITDB HIGH python VERIFIED
SyncBreeze <10.6 - Buffer Overflow
A buffer overflow vulnerability in Import Command in SyncBreeze before 10.6, DiskSorter before 10.6, DiskBoss before 8.9, DiskPulse before 10.6, DiskSavvy before 10.6, DupScout before 10.6, and VX Search before 10.6 allows attackers to execute arbitrary code via a crafted XML file containing a long name attribute of a classify element.
by Daniel Teixeira
CVSS 7.8
EIP-2026-119192 EXPLOITDB python VERIFIED
Sync Breeze Enterprise 9.5.16 - 'GET' Remote Buffer Overflow (SEH)
by Daniel Teixeira
CVE-2017-7310 EXPLOITDB HIGH python VERIFIED
SyncBreeze <10.6 - Buffer Overflow
A buffer overflow vulnerability in Import Command in SyncBreeze before 10.6, DiskSorter before 10.6, DiskBoss before 8.9, DiskPulse before 10.6, DiskSavvy before 10.6, DupScout before 10.6, and VX Search before 10.6 allows attackers to execute arbitrary code via a crafted XML file containing a long name attribute of a classify element.
by Daniel Teixeira
CVSS 7.8
EIP-2026-106991 EXPLOITDB python VERIFIED
EyesOfNetwork (EON) 5.1 - SQL Injection
by Dany Bach