Python Exploits

5,948 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-117217 EXPLOITDB python
FTPShell Client 5.24 - Local Buffer Overflow
by hyp3rlinx
CVE-2015-7874 EXPLOITDB CRITICAL python
KiTTY Portable <0.65.0.2p - RCE
Buffer overflow in the chat server in KiTTY Portable 0.65.0.2p and earlier allows remote attackers to execute arbitrary code via a long nickname.
by Guillaume Kaddouch
CVSS 9.8
EIP-2026-117389 EXPLOITDB python
KiTTY Portable 0.65.1.1p - Local Saved Session Overflow (Egghunter XP / Denial of Service 7/8.1/10)
by Guillaume Kaddouch
EIP-2026-117388 EXPLOITDB python VERIFIED
KiTTY Portable 0.65.0.2p (Windows 8.1/10) - Local kitty.ini Overflow
by Guillaume Kaddouch
EIP-2026-117387 EXPLOITDB python VERIFIED
KiTTY Portable 0.65.0.2p (Windows 7) - Local kitty.ini Overflow (Wow64 Egghunter)
by Guillaume Kaddouch
CVE-2025-34119 EXPLOITDB HIGH python VERIFIED
EasyCafe Server <2.2.14 - Info Disclosure
A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data.
by R-73eN
EIP-2026-115955 EXPLOITDB python
Notepad++ NPPFtp Plugin 0.26.3 - Buffer Overflow
by R-73eN
CVE-2015-8562 EXPLOITDB python
Joomla! <3.4.6 - Code Injection
Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
by Andrew McNicol
CVE-2015-8566 EXPLOITDB python
Joomla! Framework <1.3.1 - RCE
The Session package 1.x before 1.3.1 for Joomla! Framework allows remote attackers to execute arbitrary code via unspecified session values.
by Andrew McNicol
EIP-2026-118470 EXPLOITDB python VERIFIED
Easy File Sharing Web Server 7.2 - HEAD Request Buffer Overflow (SEH)
by ArminCyber
EIP-2026-118469 EXPLOITDB python VERIFIED
Easy File Sharing Web Server 7.2 - GET Buffer Overflow (SEH)
by ArminCyber
EIP-2026-115418 EXPLOITDB python
IBM Tivoli Storage Manager FastBack Server 5.5.4.2 - Invalid Pointer Dereference
by Ptrace Security
EIP-2026-115417 EXPLOITDB python
IBM Tivoli Storage Manager FastBack Server 5.5.4.2 - '_FXCLI_SetConfFileChunk' Stack Buffer Overflow (PoC)
by Ptrace Security
EIP-2026-115416 EXPLOITDB python
IBM Tivoli Storage Manager FastBack Server 5.5.4.2 - '_FXCLI_GetConfFileChunk' Stack Buffer Overflow (PoC)
by Ptrace Security
CVE-2015-8562 EXPLOITDB python VERIFIED
Joomla! <3.4.6 - Code Injection
Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
by Sec-1
EIP-2026-119682 EXPLOITDB python
OpenMRS 2.3 (1.11.4) - XML External Entity Processing
by LiquidWorm
CVE-2015-4027 EXPLOITDB python
Acunetix Web Vulnerability Scanner < 10 - Access Control
The AcuWVSSchedulerv10 service in Acunetix Web Vulnerability Scanner (WVS) before 10 build 20151125 allows local users to gain privileges via a command parameter in the reporttemplate property in a params JSON object to api/addScan.
by Daniele Linguaglossa
CVE-2015-5287 EXPLOITDB python VERIFIED
ABRT sosreport Privilege Escalation
The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users with certain permissions to gain privileges via a symlink attack on a file with a predictable name, as demonstrated by /var/tmp/abrt/abrt-hax-coredump or /var/spool/abrt/abrt-hax-coredump.
by rebel
CVE-2015-5287 EXPLOITDB python VERIFIED
ABRT sosreport Privilege Escalation
The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users with certain permissions to gain privileges via a symlink attack on a file with a predictable name, as demonstrated by /var/tmp/abrt/abrt-hax-coredump or /var/spool/abrt/abrt-hax-coredump.
by rebel
EIP-2026-118471 EXPLOITDB python
Easy File Sharing Web Server 7.2 - Remote Buffer Overflow (SEH) (DEP Bypass + ROP)
by Knaps
EIP-2026-116351 EXPLOITDB python
SuperScan 4.1 - Windows Enumeration Hostname/IP/URL Field Overflow (SEH)
by Luis Martínez
EIP-2026-116350 EXPLOITDB python
SuperScan 4.1 - Tools Hostname/IP/URL Field Buffer Overflow
by Luis Martínez
EIP-2026-116349 EXPLOITDB python
SuperScan 4.1 - Scan Hostname/IP Field Buffer Overflow
by Luis Martínez
EIP-2026-116205 EXPLOITDB python
Sam Spade 1.14 - Decode URL Buffer Overflow Crash (PoC)
by Vivek Mahajan
EIP-2026-116204 EXPLOITDB python
Sam Spade 1.14 - Browse URL Buffer Overflow (PoC)
by Nipun Jaswal