Python Exploits

5,948 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-115269 EXPLOITDB python VERIFIED
foobar2000 1.3.9 - '.pls' / '.m3u' / '.m3u8' Local Crash (PoC)
by Antonio Z.
EIP-2026-115268 EXPLOITDB python VERIFIED
foobar2000 1.3.9 - '.asx' Local Crash (PoC)
by Antonio Z.
EIP-2026-104795 EXPLOITDB python
XCart 5.2.6 - Code Execution
by Curesec Research Team
EIP-2026-104718 EXPLOITDB python
ClipperCMS 1.3.0 - Code Execution
by Curesec Research Team
EIP-2026-116206 EXPLOITDB python VERIFIED
Sam Spade 1.14 - S-Lang Command Field Overflow (SEH)
by Nipun Jaswal
EIP-2026-102745 EXPLOITDB python VERIFIED
TACK 1.07 - Local Stack Buffer Overflow
by Juan Sacco
EIP-2026-102580 EXPLOITDB python VERIFIED
FBZX 2.10 - Local Stack Buffer Overflow
by Juan Sacco
EIP-2026-102385 EXPLOITDB python
Jenkins 1.633 - Credential Recovery
by The Repo
EIP-2026-116079 EXPLOITDB python VERIFIED
POP Peeper 4.0.1 - Overwrite (SEH)
by Un_N0n
EIP-2026-116116 EXPLOITDB python VERIFIED
QNap QVR Client 5.1.0.11290 - Crash (PoC)
by Luis Martínez
EIP-2026-117244 EXPLOITDB python VERIFIED
Gold MP4 Player - '.swf' Local Overflow
by Vivek Mahajan
CVE-2011-3478 EXPLOITDB python VERIFIED
Symantec pcAnywhere <12.5.3 - RCE
The host-services component in Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), does not properly filter login and authentication data, which allows remote attackers to execute arbitrary code via a crafted session on TCP port 5631.
by Tomislav Paskalev
EIP-2026-117993 EXPLOITDB python VERIFIED
TCPing 2.1.0 - Local Buffer Overflow
by hyp3rlinx
EIP-2026-117889 EXPLOITDB python
Sam Spade 1.14 - Scan Addresses Buffer Overflow
by VIKRAMADITYA
EIP-2026-117888 EXPLOITDB python VERIFIED
Sam Spade 1.14 - Crawl Website Buffer Overflow
by MandawCoder
EIP-2026-116207 EXPLOITDB python VERIFIED
Sam Spade 1.14 - Scan From IP Address Field Overflow Crash (SEH) (PoC)
by Luis Martínez
CVE-2015-3036 EXPLOITDB python
Linux Kernel - Buffer Overflow
Stack-based buffer overflow in the run_init_sbus function in the KCodes NetUSB module for the Linux kernel, as used in certain NETGEAR products, TP-LINK products, and other products, allows remote attackers to execute arbitrary code by providing a long computer name in a session on TCP port 20005.
by Adrián Ruiz Bermudo
CVE-2015-5603 EXPLOITDB python VERIFIED
HipChat for JIRA <6.30.0 - Code Injection
The HipChat for JIRA plugin before 6.30.0 for Atlassian JIRA allows remote authenticated users to execute arbitrary Java code via unspecified vectors, related to "Velocity Template Injection Vulnerability."
by Chris Wood
CVE-2015-7893 EXPLOITDB HIGH python VERIFIED
Samsung Galaxy S6 - XSS
SecEmailUI in Samsung Galaxy S6 does not sanitize HTML email content, allows remote attackers to execute arbitrary JavaScript.
by Google Security Research
CVSS 8.8
EIP-2026-116775 EXPLOITDB python VERIFIED
Alreader 2.5 .fb2 - Based Stack Overflow (SEH) (ASLR + DEP Bypass)
by g00dv1n
EIP-2026-118473 EXPLOITDB python VERIFIED
Easy File Sharing Web Server 7.2 - Remote Overflow (SEH)
by Audit0r
EIP-2026-101553 EXPLOITDB python VERIFIED
Beckhoff CX9020 CPU Module - Remote Code Execution
by Photubias
EIP-2026-117264 EXPLOITDB python
HandyPassword 4.9.3 - Overwrite (SEH)
by Un_N0n
EIP-2026-118011 EXPLOITDB python
Tomabo MP4 Player 3.11.6 - Local Stack Overflow (SEH)
by yokoacc_ nudragn_ rungga_reksya
EIP-2026-116491 EXPLOITDB python VERIFIED
VideoLAN VLC Media Player 2.2.1 - libvlccore '.mp3' Stack Overflow
by Andrea Sindoni