a 'vulnerability' is actually a complex exploitation of a number of underlying and interacting software
anything that exploits a program like internet explorer will probably be a very complex set of instructions or logic
if you are interested in learning about how to exploit or even discover your own vulnerabilities you should look into a linux distro that comes with metasploit like kali linux:
http://www.kali.org/ ; or read blog posts by people who have discovered such vulnerabilities or seeing how they have patched a vulnerability and reversing the procedure
posting a python script to exploit something like internet explorer is unfeasible... theoretically possible, but unfeasible
both in the execution due the probable complexity of such a script as well in the request that someone write it for you
security is something you need to put a lot of effort and time into doing well,
definitely worth learning, but you will have to do the research yourself