Exploit Intelligence Platform
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
285 results
Clear all
CVE-2020-13927
9.8
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Airflow < 1.10.11 - Missing Authentication
The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default
CWE-306
Nov 10, 2020
CVE-2020-11651
9.8
CRITICAL
KEV
17 PoCs
Analysis
EPSS 0.94
SaltStack Salt <2019.2.4,3000.2 - RCE
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
Apr 30, 2020
CVE-2020-11652
6.5
MEDIUM
KEV
10 PoCs
Analysis
EPSS 0.94
Salt < 2019.2.4 - Path Traversal
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
CWE-22
Apr 30, 2020
CVE-2020-11978
8.8
HIGH
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Airflow < 1.10.11 - OS Command Injection
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
CWE-78
Jul 17, 2020
CVE-2020-25592
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.43
Salt < 2015.8.10 - Authentication Bypass
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
CWE-287
Nov 06, 2020
CVE-2020-11981
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.92
Apache Airflow < 1.10.10 - OS Command Injection
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.
CWE-78
Jul 17, 2020
CVE-2020-14343
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.14
Pyyaml < 5.4 - Improper Input Validation
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
CWE-20
Feb 09, 2021
CVE-2020-9480
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Apache Spark < 2.4.5 - Missing Authentication
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
CWE-306
Jun 23, 2020
CVE-2020-16846
9.8
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
SaltStack Salt REST API Arbitrary Command Execution
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
CWE-78
Nov 06, 2020
CVE-2020-7471
9.8
CRITICAL
8 PoCs
Analysis
EPSS 0.09
Django < 1.11.28 - SQL Injection
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
CWE-89
Feb 03, 2020
CVE-2020-28243
7.8
HIGH
1 PoC
Analysis
EPSS 0.01
Salt < 2015.8.10 - Command Injection
An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.
CWE-77
Feb 27, 2021
CVE-2020-25449
4.8
MEDIUM
1 PoC
Analysis
EPSS 0.01
Arachnys Cabot - XSS
Cross Site Scripting (XSS) vulnerability in Arachnys Cabot 0.11.12 can be exploited via the Address column.
CWE-79
Dec 04, 2020
CVE-2020-7734
8.2
HIGH
1 PoC
Analysis
EPSS 0.01
Arachnys Cabot < 0.11.16 - XSS
All versions of package cabot are vulnerable to Cross-site Scripting (XSS) via the Endpoint column.
CWE-79
Sep 22, 2020
CVE-2020-13254
5.9
MEDIUM
1 PoC
Analysis
EPSS 0.09
Django <2.2.13, <3.0.7 - Info Disclosure
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
CWE-295
Jun 03, 2020
CVE-2020-5236
5.7
MEDIUM
1 PoC
Analysis
EPSS 0.14
Agendaless Waitress < 1.4.3 - Denial of Service
Waitress version 1.4.2 allows a DOS attack When waitress receives a header that contains invalid characters. When a header like "Bad-header: xxxxxxxxxxxxxxx\x10" is received, it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions. This allows an attacker to send a single request with an invalid header and take the service offline. This issue was introduced in version 1.4.2 when the regular expression was updated to attempt to match the behaviour required by errata associated with RFC7230. The regular expression that is used to validate incoming headers has been updated in version 1.4.3, it is recommended that people upgrade to the new version of Waitress as soon as possible.
CWE-400
Feb 04, 2020
CVE-2019-11358
6.1
MEDIUM
EXPLOITED
7 PoCs
Analysis
EPSS 0.02
jQuery <3.4.0 - Info Disclosure
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CWE-1321
Apr 20, 2019
CVE-2019-14322
7.5
HIGH
4 PoCs
Analysis
NUCLEI
EPSS 0.90
Pallets Werkzeug <0.15.5 - Path Traversal
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
CWE-22
Jul 28, 2019
CVE-2019-16784
7.0
HIGH
2 PoCs
Analysis
EPSS 0.03
PyInstaller <3.6 - Privilege Escalation
In PyInstaller before version 3.6, only on Windows, a local privilege escalation vulnerability is present in this particular case: If a software using PyInstaller in "onefile" mode is launched by a privileged user (at least more than the current one) which have his "TempPath" resolving to a world writable directory. This is the case for example if the software is launched as a service or as a scheduled task using a system account (TempPath will be C:\Windows\Temp). In order to be exploitable the software has to be (re)started after the attacker launch the exploit program, so for a service launched at startup, a service restart is needed (e.g. after a crash or an upgrade).
CWE-250
Jan 14, 2020
CVE-2019-1010268
9.8
CRITICAL
2 PoCs
Analysis
EPSS 0.13
Ladon <0.6.1 - XXE
Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call.
CWE-611
Jul 18, 2019
CVE-2019-14234
9.8
CRITICAL
1 PoC
Analysis
EPSS 0.19
Django <1.11.23,2.1.11,2.2.4 - SQL Injection
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
CWE-89
Aug 09, 2019