Python Exploits

5,738 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-103203 EXPLOITDB python
Proxmox VE - TOTP Brute Force
by Cory Cline_ Gabe Rust
EIP-2026-101420 EXPLOITDB python
Ricoh Printer - Directory and File Exposure
by Thomas Heverin
CVE-2022-26952 GITHUB HIGH python
Digi Passport Firmware <1.5.1 - Buffer Overflow
Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow in the function for building the Location header string when an unauthenticated user is redirected to the authentication page.
by X-C3LL
11 stars
CVSS 7.5
CVE-2020-26878 GITHUB HIGH python
Ruckus <1.5.1.0.21 - Command Injection
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
by X-C3LL
11 stars
CVSS 8.8
CVE-2020-26574 GITHUB CRITICAL python
Leostream Connection Broker 8.2.x - XSS
Leostream Connection Broker 8.2.x is affected by stored XSS. An unauthenticated attacker can inject arbitrary JavaScript code via the webquery.pl User-Agent HTTP header. It is rendered by the admins the next time they log in. The JavaScript injected can be used to force the admin to upload a malicious Perl script that will be executed as root via libMisc::browser_client. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
by X-C3LL
11 stars
CVSS 9.6
CVE-2019-14459 GITHUB HIGH python
nfdump <1.6.17 - DoS
nfdump 1.6.17 and earlier is affected by an integer overflow in the function Process_ipfix_template_withdraw in ipfix.c that can be abused in order to crash the process remotely (denial of service).
by X-C3LL
11 stars
CVSS 7.5
CVE-2019-12725 GITHUB CRITICAL python
Zeroshell - OS Command Injection
Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.
by X-C3LL
11 stars
CVSS 9.8
CVE-2019-12386 GITHUB MEDIUM python
Ampache <3.9.1 - XSS
An issue was discovered in Ampache through 3.9.1. A stored XSS exists in the localplay.php LocalPlay "add instance" functionality. The injected code is reflected in the instances menu. This vulnerability can be abused to force an admin to create a new privileged user whose credentials are known by the attacker.
by X-C3LL
11 stars
CVSS 5.4
CVE-2018-7081 GITHUB CRITICAL python
Arubanetworks Arubaos < 6.4.4.21 - Improper Input Validation
A remote code execution vulnerability is present in network-listening components in some versions of ArubaOS. An attacker with the ability to transmit specially-crafted IP traffic to a mobility controller could exploit this vulnerability and cause a process crash or to execute arbitrary code within the underlying operating system with full system privileges. Such an attack could lead to complete system compromise. The ability to transmit traffic to an IP interface on the mobility controller is required to carry out an attack. The attack leverages the PAPI protocol (UDP port 8211). If the mobility controller is only bridging L2 traffic to an uplink and does not have an IP address that is accessible to the attacker, it cannot be attacked.
by X-C3LL
11 stars
CVSS 9.8
CVE-2018-15503 GITHUB HIGH python
Swoole - Insecure Deserialization
The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process. An attacker can craft a serialized object to exploit this vulnerability and cause a SEGV.
by X-C3LL
11 stars
CVSS 7.5
CVE-2018-10024 GITHUB CRITICAL python
ubiQuoss Switch VP5208A - Info Disclosure
ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).
by X-C3LL
11 stars
CVSS 9.8
CVE-2017-8893 GITHUB HIGH python
AeroAdmin 4.1 - Buffer Overflow
AeroAdmin 4.1 uses a function to copy data between two pointers where the size of the data copied is taken directly from a network packet. This can cause a buffer overflow and denial of service.
by X-C3LL
11 stars
CVSS 7.5
CVE-2017-14339 GITHUB HIGH python
YADIFA <2.2.6 - DoS
The DNS packet parser in YADIFA before 2.2.6 does not check for the presence of infinite pointer loops, and thus it is possible to force it to enter an infinite loop. This can cause high CPU usage and makes the server unresponsive.
by X-C3LL
11 stars
CVSS 7.5
CVE-2017-11318 GITHUB HIGH python
Cobiansoft Cobian Backup - OS Command Injection
Cobian Backup 11 client allows man-in-the-middle attackers to add and execute new backup tasks when the master server is spoofed. In addition, the attacker can execute system commands remotely by abusing pre-backup events.
by X-C3LL
11 stars
CVSS 8.1
CVE-2024-22107 GITHUB HIGH python
GTB Central Console 15.17.1-30814.NG - Command Injection
An issue was discovered in GTB Central Console 15.17.1-30814.NG. The method systemSettingsDnsDataAction at /opt/webapp/src/AppBundle/Controller/React/SystemSettingsController.php is vulnerable to command injection via the /old/react/v1/api/system/dns/data endpoint. An authenticated attacker can abuse it to inject an arbitrary command and compromise the platform.
by X-C3LL
11 stars
CVSS 7.2
CVE-2023-6131 GITHUB HIGH python
salesagility/suitecrm <7.14.2-8.4.2 - Code Injection
Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
by navsec
CVSS 8.8
CVE-2023-6130 GITHUB HIGH python
salesagility/suitecrm <7.14.2-8.4.2 - Path Traversal
Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
by navsec
CVSS 8.8
CVE-2023-6128 GITHUB MEDIUM python
GitHub salesagility/suitecrm <7.14.2-8.4.2 - XSS
Cross-site Scripting (XSS) - Reflected in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
by navsec
CVSS 5.4
CVE-2022-45326 GITHUB MEDIUM python
Kwoksys Information Server < 2.9.5 - XXE
An XML external entity (XXE) injection vulnerability in Kwoksys Kwok Information Server before v2.9.5.SP31 allows remote authenticated users to conduct server-side request forgery (SSRF) attacks.
by navsec
CVSS 4.9
CVE-2023-46604 GITHUB CRITICAL python
Java OpenWire - Deserialization RCE
The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
by kaushik-reddy
CVSS 10.0
CVE-2019-9053 GITHUB HIGH python
Cmsmadesimple Cms Made Simple - SQL Injection
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
by kaushik-reddy
CVSS 8.1
CVE-2023-23752 GITHUB MEDIUM python
Joomla! < 4.2.8 - Improper Access Control
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
by JorgeRh4ck
1 stars
CVSS 5.3
CVE-2022-22963 GITHUB CRITICAL python
Vmware Spring Cloud Function < 3.1.6 - Remote Code Execution
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
by JorgeRh4ck
1 stars
CVSS 9.8
CVE-2021-41091 GITHUB MEDIUM python
Moby - Path Traversal
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to host volumes to trusted containers.
by JorgeRh4ck
1 stars
CVSS 6.3
CVE-2023-46604 GITHUB CRITICAL python
Java OpenWire - Deserialization RCE
The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
by oscerd
1 stars
CVSS 10.0