Python Exploits

5,740 exploits tracked across all sources.

Sort: Activity Stars
CVE-2021-33990 EXPLOITDB CRITICAL python
Liferay Portal - OS Command Injection
Liferay Portal 6.2.5 allows Command=FileUpload&Type=File&CurrentFolder=/ requests when frmfolders.html exists. NOTE: The vendor disputes this issue because the exploit reference link only shows frmfolders.html is accessible and does not demonstrate how an unauthorized user can upload a file.
by Fu2x2000
CVSS 9.8
CVE-2020-5330 EXPLOITDB HIGH python
Dell R1-2210 Firmware < 3.0.1.2 - Information Disclosure
Dell EMC Networking X-Series firmware versions 3.0.1.2 and older, Dell EMC Networking PC5500 firmware versions 4.1.0.22 and older and Dell EMC PowerEdge VRTX Switch Modules firmware versions 2.0.0.77 and older contain an information disclosure vulnerability. A remote unauthenticated attacker could exploit this vulnerability to retrieve sensitive data by sending a specially crafted request to the affected endpoints.
by Ken Pyle
CVSS 8.1
CVE-2023-0744 EXPLOITDB CRITICAL python VERIFIED
Answer < 1.0.4 - Improper Access Control
Improper Access Control in GitHub repository answerdev/answer prior to 1.0.4.
by Eduardo Pérez-Malumbres Cervera
CVSS 9.8
CVE-2023-53979 EXPLOITDB HIGH python
MyBB 1.8.32 - Authenticated RCE
MyBB 1.8.32 contains a chained vulnerability that allows authenticated administrators to bypass avatar upload restrictions and execute arbitrary code. Attackers can modify upload path settings, upload a malicious PHP-embedded image file, and execute commands through the language configuration editing interface.
by lUc1f3r11
CVSS 8.8
EIP-2026-117253 EXPLOITDB python
Grand Theft Auto III/Vice City Skin File v1.1 - Buffer Overflow
by Knursoft
CVE-2020-25213 EXPLOITDB CRITICAL python VERIFIED
WordPress File Manager Unauthenticated Remote Code Execution
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
by BLY
CVSS 10.0
CVE-2023-23488 EXPLOITDB CRITICAL python VERIFIED
Strangerstudios Paid Memberships Pro < 2.9.8 - SQL Injection
The Paid Memberships Pro WordPress Plugin, version < 2.9.8, is affected by an unauthenticated SQL injection vulnerability in the 'code' parameter of the '/pmpro/v1/order' REST route.
by r3nt0n
CVSS 9.8
CVE-2021-43116 EXPLOITDB HIGH python
Nacos 2.0.3 - Privilege Escalation
An Access Control vulnerability exists in Nacos 2.0.3 in the access prompt page; enter username and password, click on login to capture packets and then change the returned package, which lets a malicious user login.
by Jenson Zhao
CVSS 8.8
CVE-2022-2884 EXPLOITDB CRITICAL python VERIFIED
GitLab CE/EE <15.1.5-15.3.1 - Authenticated RCE
A vulnerability in GitLab CE/EE affecting all versions from 11.3.4 prior to 15.1.5, 15.2 to 15.2.3, 15.3 to 15.3 to 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint
by Antonio Francesco Sardella
CVSS 9.9
EIP-2026-112471 EXPLOITDB python
SugarCRM 12.2.0 - Remote Code Execution (RCE)
by sw33t.0day
CVE-2021-44790 EXPLOITDB CRITICAL python VERIFIED
Apache HTTP Server < 2.4.52 - Out-of-Bounds Write
A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
by Sunil Iyengar
CVSS 9.8
CVE-2022-48194 EXPLOITDB HIGH python
Tp-link Tl-wr902ac Firmware < 3.0.9.1 - Unrestricted File Upload
TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
by Tobias Müller
CVSS 8.8
CVE-2022-44149 EXPLOITDB HIGH python
Nexxt Amp300 ARN02304U8 - RCE
The web service on Nexxt Amp300 ARN02304U8 42.103.1.5095 and 80.103.2.5045 devices allows remote OS command execution by placing &telnetd in the JSON host field to the ping feature of the goform/sysTools component. Authentication is required
by Yerodin Richards
CVSS 8.8
CVE-2022-45030 EXPLOITDB HIGH python
Rconfig - SQL Injection
A SQL injection vulnerability in rConfig 3.9.7 exists via lib/ajaxHandlers/ajaxCompareGetCmdDates.php?command= (this may interact with secure-file-priv).
by azhen
CVSS 8.8
EIP-2026-108935 EXPLOITDB python
Judging Management System v1.0 - Remote Code Execution (RCE)
by Angelo Pio Amirante
CVE-2022-46169 EXPLOITDB CRITICAL python
Cacti 1.2.22 unauthenticated command injection
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For: <TARGETIP>`. This way the function `get_client_addr` returns the IP address of the server running Cacti. The following call to `gethostbyaddr` will resolve this IP address to the hostname of the server, which will pass the `poller` hostname check because of the default entry. After the authorization of the `remote_agent.php` file is bypassed, an attacker can trigger different actions. One of these actions is called `polldata`. The called function `poll_for_data` retrieves a few request parameters and loads the corresponding `poller_item` entries from the database. If the `action` of a `poller_item` equals `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a PHP script. The attacker-controlled parameter `$poller_id` is retrieved via the function `get_nfilter_request_var`, which allows arbitrary strings. This variable is later inserted into the string passed to `proc_open`, which leads to a command injection vulnerability. By e.g. providing the `poller_id=;id` the `id` command is executed. In order to reach the vulnerable call, the attacker must provide a `host_id` and `local_data_id`, where the `action` of the corresponding `poller_item` is set to `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and `local_data_id`) can easily be bruteforced. The only requirement is that a `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is very likely on a productive instance because this action is added by some predefined templates like `Device - Uptime` or `Device - Polling Time`. This command injection vulnerability allows an unauthenticated user to execute arbitrary commands if a `poller_item` with the `action` type `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass should be prevented by not allowing an attacker to make `get_client_addr` (file `lib/functions.php`) return an arbitrary IP address. This could be done by not honoring the `HTTP_...` `$_SERVER` variables. If these should be kept for compatibility reasons it should at least be prevented to fake the IP address of the server running Cacti. This vulnerability has been addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being the first release containing the patch.
by Riadh Bouchahoua
CVSS 9.8
CVE-2022-46770 EXPLOITDB HIGH python
qubes-mirage-firewall <0.8.4 - DoS
qubes-mirage-firewall (aka Mirage firewall for QubesOS) 0.8.x through 0.8.3 allows guest OS users to cause a denial of service (CPU consumption and loss of forwarding) via a crafted multicast UDP packet (IP address range of 224.0.0.0 through 239.255.255.255).
by Krzysztof Burghardt
CVSS 7.5
CVE-2020-36911 EXPLOITDB CRITICAL python
Covenant 0.1.3-0.5 - RCE
Covenant 0.1.3 - 0.5 contains a remote code execution vulnerability that allows attackers to craft malicious JWT tokens with administrative privileges. Attackers can generate forged tokens with admin roles and upload custom DLL payloads to execute arbitrary commands on the target system.
by xThaz
CVSS 9.8
CVE-2022-24632 EXPLOITDB MEDIUM python
AudioCodes Device Manager Express <7.8.20002.47752 - Path Traversal
An issue was discovered in AudioCodes Device Manager Express through 7.8.20002.47752. It is directory traversal during file download via the BrowseFiles.php view parameter.
by Eric Flokstra
CVSS 5.3
EIP-2026-101071 EXPLOITDB python
Router ZTE-H108NS - Stack Buffer Overflow (DoS)
by George Tsimpidas
CVE-2023-54330 EXPLOITDB CRITICAL python
Inbit Messenger < 4.9.0 - Out-of-Bounds Write
Inbit Messenger versions 4.6.0 to 4.9.0 contain a remote stack-based buffer overflow vulnerability that allows unauthenticated attackers to execute arbitrary code by sending malformed network packets. Attackers can craft a specially designed payload targeting the messenger's network handler to overwrite the Structured Exception Handler (SEH) and execute shellcode on vulnerable Windows systems.
by a-rey
CVSS 9.8
CVE-2023-54329 EXPLOITDB CRITICAL python
Inbit Messenger < 4.9.0 - Out-of-Bounds Write
Inbit Messenger 4.6.0 - 4.9.0 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by exploiting a stack overflow in the messenger's protocol. Attackers can send specially crafted XML packets to port 10883 with a malicious payload to trigger the vulnerability and execute commands with system privileges.
by a-rey
CVSS 9.8
CVE-2022-1565 EXPLOITDB HIGH python VERIFIED
Wpallimport WP All Import < 3.6.8 - Unrestricted File Upload
The plugin WP All Import is vulnerable to arbitrary file uploads due to missing file type validation via the wp_all_import_get_gz.php file in versions up to, and including, 3.6.7. This makes it possible for authenticated attackers, with administrator level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible.
by AkuCyberSec
CVSS 7.2
EIP-2026-111761 EXPLOITDB python
Revenue Collection System v1.0 - Remote Code Execution (RCE)
by Joe Pollock
CVE-2022-32272 EXPLOITDB CRITICAL python
Opswat Metadefender < 5.1.2 - Improper Privilege Management
OPSWAT MetaDefender Core before 5.1.2, MetaDefender ICAP before 4.12.1, and MetaDefender Email Gateway Security before 5.6.1 have incorrect access control, resulting in privilege escalation.
by Ulascan Yildirim
CVSS 9.8