Python Exploits

5,951 exploits tracked across all sources.

Sort: Activity Stars
CVE-2014-2671 EXPLOITDB python VERIFIED
Microsoft Windows Media Player 11.0.5721.5230 - Memory Corruption
Microsoft Windows Media Player (WMP) 11.0.5721.5230 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted WAV file.
by TUNISIAN CYBER
CVE-2014-2671 EXPLOITDB python VERIFIED
Microsoft Windows Media Player 11.0.5721.5230 - Memory Corruption
Microsoft Windows Media Player (WMP) 11.0.5721.5230 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted WAV file.
by TUNISIAN CYBER
CVE-2014-2671 EXPLOITDB python VERIFIED
Microsoft Windows Media Player 11.0.5721.5230 - Memory Corruption
Microsoft Windows Media Player (WMP) 11.0.5721.5230 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted WAV file.
by TUNISIAN CYBER
CVE-2014-2671 EXPLOITDB python VERIFIED
Microsoft Windows Media Player 11.0.5721.5230 - Memory Corruption
Microsoft Windows Media Player (WMP) 11.0.5721.5230 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted WAV file.
by TUNISIAN CYBER
EIP-2026-117390 EXPLOITDB python VERIFIED
KMPlayer 3.8.0.117 - Local Buffer Overflow
by metacom
CVE-2014-2206 EXPLOITDB python VERIFIED
GetGo Download Manager <4.9.0.1982 - Buffer Overflow
Stack-based buffer overflow in GetGo Download Manager 4.9.0.1982, 4.8.2.1346, 4.4.5.502, and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a long HTTP Response Header.
by Julien Ahrens
EIP-2026-103901 EXPLOITDB python VERIFIED
ET - Chat Password Reset Security Bypass
by IRH
EIP-2026-116936 EXPLOITDB python VERIFIED
Calavera UpLoader 3.5 - Local Buffer Overflow (SEH)
by Daniel la calavera
EIP-2026-117245 EXPLOITDB python
Gold MP4 Player 3.3 - Local Buffer Overflow (SEH)
by metacom
EIP-2026-102616 EXPLOITDB python
GoAhead Web Server 3.1.x - Denial of Service
by Alaeddine MESBAHI
CVE-2014-1912 EXPLOITDB python
Python <2.7.7, <3.3.4, <3.4rc1 - Buffer Overflow
Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
by Sha0
EIP-2026-102481 EXPLOITDB python
Ganib Project Management 2.3 - SQL Injection
by drone
CVE-2013-5014 EXPLOITDB python VERIFIED
Symantec Endpoint Protection Manager - XXE
The management console in Symantec Endpoint Protection Manager (SEPM) 11.0 before 11.0.7405.1424 and 12.1 before 12.1.4023.4080, and Symantec Protection Center Small Business Edition 12.x before 12.1.4023.4080, allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
by Chris Graham
CVE-2013-5015 EXPLOITDB python VERIFIED
Symantec Endpoint Protection Manager - SQL Injection
SQL injection vulnerability in the management console in Symantec Endpoint Protection Manager (SEPM) 11.0 before 11.0.7405.1424 and 12.1 before 12.1.4023.4080, and Symantec Protection Center Small Business Edition 12.x before 12.1.4023.4080, allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
by Chris Graham
CVE-2013-5019 EXPLOITDB python VERIFIED
Ultra Mini HTTPD 1.21 - Buffer Overflow
Stack-based buffer overflow in Ultra Mini HTTPD 1.21 allows remote attackers to execute arbitrary code via a long resource name in an HTTP request.
by OJ Reeves
CVE-2014-100015 EXPLOITDB python VERIFIED
Solidworks Product Data Management - Path Traversal
Directory traversal vulnerability in pdmwService.exe in SolidWorks Workgroup PDM 2014 allows remote attackers to write to arbitrary files via a .. (dot dot) in the filename in a file upload.
by Mohamed Shetta
EIP-2026-119252 EXPLOITDB python VERIFIED
VideoCharge Studio 2.12.3.685 - 'GetHttpResponse()' Man In The Middle Remote Code Execution
by Julien Ahrens
CVE-2013-4730 EXPLOITDB python VERIFIED
PCMan's FTP Server 2.0.7 - RCE
Buffer overflow in PCMan's FTP Server 2.0.7 allows remote attackers to execute arbitrary code via a long string in a USER command.
by Sumit
EIP-2026-115023 EXPLOITDB python
Catia V5-6R2013 - 'CATV5_Backbone_Bus' Stack Buffer Overflow (PoC)
by Mohamed Shetta
CVE-2014-125122 EXPLOITDB MEDIUM python
Linksys WRT120N - Buffer Overflow
A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.
by Craig Heffner
EIP-2026-119251 EXPLOITDB python VERIFIED
VideoCharge Studio - 'CHTTPResponse::GetHttpResponse()' Remote Stack Buffer Overflow
by Julien Ahrens
CVE-2014-100014 EXPLOITDB python
Solidworks Product Data Management - Memory Corruption
Multiple stack-based buffer overflows in pdmwService.exe in SolidWorks Workgroup PDM 2014 SP2 allow remote attackers to execute arbitrary code via a long string in a (1) 2001, (2) 2002, or (3) 2003 opcode to port 3000.
by Mohamed Shetta
EIP-2026-115022 EXPLOITDB python
Catia V5-6R2013 - 'CATV5_AllApplications' Stack Buffer Overflow (PoC)
by Mohamed Shetta
CVE-2014-2072 EXPLOITDB CRITICAL python VERIFIED
Dassault Systemes Catia V5-6R2013 - Buffer Overflow
Dassault Systemes Catia V5-6R2013: Stack Buffer Overflow due to inadequate boundary checks
by Mohamed Shetta
CVSS 9.8
CVE-2013-5019 EXPLOITDB python VERIFIED
Ultra Mini HTTPD 1.21 - Buffer Overflow
Stack-based buffer overflow in Ultra Mini HTTPD 1.21 allows remote attackers to execute arbitrary code via a long resource name in an HTTP request.
by Sumit