Python Exploits

5,750 exploits tracked across all sources.

Sort: Activity Stars
CVE-2019-6447 EXPLOITDB HIGH python
Estrongs ES File Explorer File Manager - Missing Authentication
The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
by Nehal Zaman
CVSS 8.1
EIP-2026-101877 EXPLOITDB python
Netgear WNAP320 2.0.3 - 'macAddress' Remote Code Execution (RCE) (Unauthenticated)
by Bryan Leong
CVE-2019-12744 EXPLOITDB HIGH python
Seeddms < 5.1.11 - Unrestricted File Upload
SeedDMS before 5.1.11 allows Remote Command Execution (RCE) because of unvalidated file upload of PHP scripts, a different vulnerability than CVE-2018-12940.
by Bryan Leong
CVSS 7.5
CVE-2021-21972 EXPLOITDB CRITICAL python
Vmware Cloud Foundation < 3.10.1.2 - Path Traversal
The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
by CHackA0101
CVSS 9.8
CVE-2020-35576 EXPLOITDB HIGH python
Tp-link Tl-wr841n Firmware < 201216 - OS Command Injection
A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions prior to 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577.
by Koh You Liang
CVSS 8.8
CVE-2009-2265 EXPLOITDB python
FCKeditor <2.6.4.1 - Path Traversal
Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory.
by Pergyz
EIP-2026-110139 EXPLOITDB python
Online Library Management System 1.0 - Arbitrary File Upload Remote Code Execution (Unauthenticated)
by Berk Can Geyikci
EIP-2026-111753 EXPLOITDB python
Responsive Tourism Website 3.1 - Remote Code Execution (RCE) (Unauthenticated)
by Tagoletta
CVE-2020-14871 EXPLOITDB CRITICAL python
Oracle Solaris 10-11 - Privilege Escalation
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
by Nathaniel Singer
CVSS 10.0
CVE-2021-32305 EXPLOITDB CRITICAL python VERIFIED
Websvn < 2.6.1 - OS Command Injection
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
by g0ldm45k
CVSS 9.8
CVE-2019-14530 EXPLOITDB HIGH python
OpenEMR <5.0.2 - Info Disclosure
An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.
by Ron Jost
CVSS 8.8
CVE-2023-38890 EXPLOITDB HIGH python
Online Shopping Portal Project 3.1 - SQL Injection
Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.
by Tagoletta
CVSS 8.8
CVE-2021-31159 EXPLOITDB MEDIUM python
Zoho ManageEngine ServiceDesk Plus MSP <10519 - Info Disclosure
Zoho ManageEngine ServiceDesk Plus MSP before 10519 is vulnerable to a User Enumeration bug due to improper error-message generation in the Forgot Password functionality, aka SDPMSP-15732.
by Ricardo Ruiz
CVSS 5.3
CVE-2018-15152 EXPLOITDB CRITICAL python
OpenEMR <5.0.1.4 - Auth Bypass
Authentication bypass vulnerability in portal/account/register.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker to access (1) portal/add_edit_event_user.php, (2) portal/find_appt_popup_user.php, (3) portal/get_allergies.php, (4) portal/get_amendments.php, (5) portal/get_lab_results.php, (6) portal/get_medications.php, (7) portal/get_patient_documents.php, (8) portal/get_problems.php, (9) portal/get_profile.php, (10) portal/portal_payment.php, (11) portal/messaging/messages.php, (12) portal/messaging/secure_chat.php, (13) portal/report/pat_ledger.php, (14) portal/report/portal_custom_report.php, or (15) portal/report/portal_patient_report.php without authenticating as a patient.
by Ron Jost
CVSS 9.1
CVE-2018-15139 EXPLOITDB HIGH python
OpenEMR <5.0.1.4 - Code Injection
Unrestricted file upload in interface/super/manage_site_files.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary PHP code by uploading a file with a PHP extension via the images upload form and accessing it in the images directory.
by Ron Jost
CVSS 8.8
CVE-2020-11060 EXPLOITDB HIGH python
GLPI <9.4.6 - Command Injection
In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.
by Brian Peters
CVSS 7.4
EIP-2026-102183 EXPLOITDB python
Secure Notepad Private Notes 3.0.3 - Denial of Service (PoC)
by Geovanni Ruiz
EIP-2026-102180 EXPLOITDB python
Post-it 5.0.1 - Denial of Service (PoC)
by Geovanni Ruiz
EIP-2026-102176 EXPLOITDB python
Notex the best notes 6.4 - Denial of Service (PoC)
by Geovanni Ruiz
CVE-2021-27200 EXPLOITDB CRITICAL python
WoWonder 3.0.4 - Code Injection
In WoWonder 3.0.4, remote attackers can take over any account due to the weak cryptographic algorithm in recover.php. The code parameter is easily predicted from the time of day.
by securityforeveryone.com
CVSS 9.8
CVE-2021-31950 EXPLOITDB HIGH python
Microsoft Sharepoint Foundation - SSRF
Microsoft SharePoint Server Spoofing Vulnerability
by Alex Birnberg
CVSS 7.6
CVE-2017-9380 EXPLOITDB HIGH python
OpenEMR <5.0.0 - Code Injection
OpenEMR 5.0.0 and prior allows low-privilege users to upload files of dangerous types which can result in arbitrary code execution within the context of the vulnerable application.
by Ron Jost
CVSS 8.8
EIP-2026-102194 EXPLOITDB python
memono Notepad Version 4.2 - Denial of Service (PoC)
by Geovanni Ruiz
EIP-2026-102185 EXPLOITDB python
Sticky Notes Widget Version 3.0.6 - Denial of Service (PoC)
by Geovanni Ruiz
EIP-2026-102175 EXPLOITDB python
n+otes 1.6.2 - Denial of Service (PoC)
by Geovanni Ruiz