Python Exploits

5,750 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-14537 EXPLOITDB MEDIUM python
Trixbox 2.8.0 - Path Traversal
trixbox 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php.
by Ron Jost
CVSS 6.5
CVE-2020-24949 EXPLOITDB HIGH python VERIFIED
Php-fusion - Privilege Escalation
Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE).
by g0ldm45k
CVSS 8.8
CVE-2021-33570 EXPLOITDB MEDIUM python
Postbird 0.8.4 - XSS
Postbird 0.8.4 allows stored XSS via the onerror attribute of an IMG element in any PostgreSQL database table. This can result in reading local files via vectors involving XMLHttpRequest and open of a file:/// URL, or discovering PostgreSQL passwords via vectors involving Window.localStorage and savedConnections.
by Debshubra Chakraborty
CVSS 5.4
CVE-2021-47821 EXPLOITDB HIGH python
RarmaRadio 2.72.8 - DoS
RarmaRadio 2.72.8 contains a denial of service vulnerability that allows attackers to crash the application by overflowing network configuration fields with large character buffers. Attackers can generate a 100,000 character buffer and paste it into multiple network settings fields to trigger application instability and potential crash.
by Ismael Nava
CVSS 7.5
CVE-2020-29607 EXPLOITDB HIGH python VERIFIED
Pluck CMS <4.7.13 - RCE
A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.
by Ron Jost
CVSS 7.2
CVE-2018-19423 EXPLOITDB HIGH python
Codiad 2.8.4 - Command Injection
Codiad 2.8.4 allows remote authenticated administrators to execute arbitrary code by uploading an executable file.
by Ron Jost
CVSS 7.2
CVE-2015-3306 EXPLOITDB python VERIFIED
ProFTPD 1.3.5 - RCE
The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
by Shellbr3ak
CVE-2019-19208 EXPLOITDB CRITICAL python
Codiad Web IDE <2.8.4 - Code Injection
Codiad Web IDE through 2.8.4 allows PHP Code injection.
by Ron Jost
CVSS 9.8
EIP-2026-117635 EXPLOITDB python VERIFIED
Mozilla Firefox 88.0.1 - File Extension Execution of Arbitrary Code
by BestEffort Team
CVE-2020-14871 EXPLOITDB CRITICAL python
Oracle Solaris 10-11 - Privilege Escalation
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
by legend
CVSS 10.0
CVE-2021-47827 EXPLOITDB HIGH python
WebSSH for iOS <14.16.10 - DoS
WebSSH for iOS 14.16.10 contains a denial of service vulnerability in the mashREPL tool that allows attackers to crash the application by pasting malformed input. Attackers can trigger the vulnerability by copying a 300-character buffer of repeated 'A' characters into the mashREPL input field, causing the application to crash.
by Luis Martínez
CVSS 7.5
EIP-2026-104321 EXPLOITDB python
ManageEngine ADSelfService Plus 6.1 - CSV Injection
by Metin Yunus Kandemir
CVE-2021-26855 EXPLOITDB CRITICAL python
Microsoft Exchange ProxyLogon RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
by Gonzalo Villegas
CVSS 9.1
CVE-2018-19422 EXPLOITDB HIGH python
Subrion CMS 4.2.1 - RCE
/panel/uploads in Subrion CMS 4.2.1 allows remote attackers to execute arbitrary PHP code via a .pht or .phar file, because the .htaccess file omits these.
by Fellipe Oliveira
CVSS 7.2
CVE-2021-33393 EXPLOITDB HIGH python
IPFire 2.25-core155 - Privilege Escalation
lfs/backup in IPFire 2.25-core155 does not ensure that /var/ipfire/backup/bin/backup.pl is owned by the root account. It might be owned by an unprivileged account, which could potentially be used to install a Trojan horse backup.pl script that is later executed by root. Similar problems with the ownership/permissions of other files may be present as well.
by Mücahit Saratar
CVSS 8.8
CVE-2021-31933 EXPLOITDB HIGH python VERIFIED
Chamilo < 1.11.14 - Remote Code Execution
A remote code execution vulnerability exists in Chamilo through 1.11.14 due to improper input sanitization of a parameter used for file uploads, and improper file-extension filtering for certain filenames (e.g., .phar or .pht). A remote authenticated administrator is able to upload a file containing arbitrary PHP code into specific directories via main/inc/lib/fileUpload.lib.php directory traversal to achieve PHP code execution.
by M. Cory Billington
CVSS 7.2
CVE-2019-12725 EXPLOITDB CRITICAL python
Zeroshell - OS Command Injection
Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.
by Fellipe Oliveira
CVSS 9.8
CVE-2020-28337 EXPLOITDB HIGH python
Microweber < 1.1.20 - Path Traversal
A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.
by sl1nki
CVSS 7.2
CVE-2021-47831 EXPLOITDB HIGH python
Sandboxie 5.49.7 - DoS
Sandboxie 5.49.7 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the container folder input field. Attackers can paste a large buffer of repeated characters into the Sandbox container folder setting to trigger an application crash.
by Erick Galindo
CVSS 7.5
EIP-2026-107674 EXPLOITDB python
Human Resource Information System 0.1 - Remote Code Execution (Unauthenticated)
by Reza Afsahi
CVE-2021-28242 EXPLOITDB HIGH python
b2evolution <7.2.2-stable - SQL Injection
SQL Injection in the "evoadm.php" component of b2evolution v7.2.2-stable allows remote attackers to obtain sensitive database information by injecting SQL commands into the "cf_name" parameter when creating a new filter under the "Collections" tab.
by nu11secur1ty
CVSS 8.8
EIP-2026-107883 EXPLOITDB python
Internship Portal Management System 1.0 - Remote Code Execution(Unauthenticated)
by argenestel
CVE-2021-47860 EXPLOITDB MEDIUM python
GetSimple CMS Custom JS 0.1 - CSRF
GetSimple CMS Custom JS 0.1 plugin contains a cross-site request forgery vulnerability that allows unauthenticated attackers to inject arbitrary client-side code into administrator browsers. Attackers can craft a malicious website that triggers a cross-site scripting payload to execute remote code on the hosting server when an authenticated administrator visits the page.
by boku
CVSS 5.3
CVE-2021-27973 EXPLOITDB HIGH python
Piwigo <11.4.0 - SQL Injection
SQL injection exists in Piwigo before 11.4.0 via the language parameter to admin.php?page=languages.
by nu11secur1ty
CVSS 7.2
CVE-2016-4971 EXPLOITDB HIGH python
GNU wget <1.18 - Code Injection
GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.
by liewehacksie
CVSS 8.8