Exploit Intelligence Platform

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,363 CVEs tracked 53,626 with exploits 4,858 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,844 researchers
285 results Clear all
CVE-2020-13927 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
Apache Airflow < 1.10.11 - Missing Authentication
The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default
CWE-306 Nov 10, 2020
CVE-2020-11651 9.8 CRITICAL KEV 17 PoCs Analysis EPSS 0.94
SaltStack Salt <2019.2.4,3000.2 - RCE
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
Apr 30, 2020
CVE-2020-11652 6.5 MEDIUM KEV 10 PoCs Analysis EPSS 0.94
Salt < 2019.2.4 - Path Traversal
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
CWE-22 Apr 30, 2020
CVE-2020-11978 8.8 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Apache Airflow < 1.10.11 - OS Command Injection
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
CWE-78 Jul 17, 2020
CVE-2020-25592 9.8 CRITICAL 1 PoC Analysis EPSS 0.43
Salt < 2015.8.10 - Authentication Bypass
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
CWE-287 Nov 06, 2020
CVE-2020-11981 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.92
Apache Airflow < 1.10.10 - OS Command Injection
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.
CWE-78 Jul 17, 2020
CVE-2020-14343 9.8 CRITICAL 3 PoCs Analysis EPSS 0.14
Pyyaml < 5.4 - Improper Input Validation
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
CWE-20 Feb 09, 2021
CVE-2020-9480 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Apache Spark < 2.4.5 - Missing Authentication
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
CWE-306 Jun 23, 2020
CVE-2020-16846 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
SaltStack Salt REST API Arbitrary Command Execution
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
CWE-78 Nov 06, 2020
CVE-2020-7471 9.8 CRITICAL 8 PoCs Analysis EPSS 0.09
Django < 1.11.28 - SQL Injection
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
CWE-89 Feb 03, 2020
CVE-2020-28243 7.8 HIGH 1 PoC Analysis EPSS 0.01
Salt < 2015.8.10 - Command Injection
An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.
CWE-77 Feb 27, 2021
CVE-2020-25449 4.8 MEDIUM 1 PoC Analysis EPSS 0.01
Arachnys Cabot - XSS
Cross Site Scripting (XSS) vulnerability in Arachnys Cabot 0.11.12 can be exploited via the Address column.
CWE-79 Dec 04, 2020
CVE-2020-7734 8.2 HIGH 1 PoC Analysis EPSS 0.01
Arachnys Cabot < 0.11.16 - XSS
All versions of package cabot are vulnerable to Cross-site Scripting (XSS) via the Endpoint column.
CWE-79 Sep 22, 2020
CVE-2020-13254 5.9 MEDIUM 1 PoC Analysis EPSS 0.09
Django <2.2.13, <3.0.7 - Info Disclosure
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
CWE-295 Jun 03, 2020
CVE-2020-5236 5.7 MEDIUM 1 PoC Analysis EPSS 0.14
Agendaless Waitress < 1.4.3 - Denial of Service
Waitress version 1.4.2 allows a DOS attack When waitress receives a header that contains invalid characters. When a header like "Bad-header: xxxxxxxxxxxxxxx\x10" is received, it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions. This allows an attacker to send a single request with an invalid header and take the service offline. This issue was introduced in version 1.4.2 when the regular expression was updated to attempt to match the behaviour required by errata associated with RFC7230. The regular expression that is used to validate incoming headers has been updated in version 1.4.3, it is recommended that people upgrade to the new version of Waitress as soon as possible.
CWE-400 Feb 04, 2020
CVE-2019-11358 6.1 MEDIUM EXPLOITED 7 PoCs Analysis EPSS 0.02
jQuery <3.4.0 - Info Disclosure
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CWE-1321 Apr 20, 2019
CVE-2019-14322 7.5 HIGH 4 PoCs Analysis NUCLEI EPSS 0.90
Pallets Werkzeug <0.15.5 - Path Traversal
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
CWE-22 Jul 28, 2019
CVE-2019-16784 7.0 HIGH 2 PoCs Analysis EPSS 0.03
PyInstaller <3.6 - Privilege Escalation
In PyInstaller before version 3.6, only on Windows, a local privilege escalation vulnerability is present in this particular case: If a software using PyInstaller in "onefile" mode is launched by a privileged user (at least more than the current one) which have his "TempPath" resolving to a world writable directory. This is the case for example if the software is launched as a service or as a scheduled task using a system account (TempPath will be C:\Windows\Temp). In order to be exploitable the software has to be (re)started after the attacker launch the exploit program, so for a service launched at startup, a service restart is needed (e.g. after a crash or an upgrade).
CWE-250 Jan 14, 2020
CVE-2019-1010268 9.8 CRITICAL 2 PoCs Analysis EPSS 0.13
Ladon <0.6.1 - XXE
Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call.
CWE-611 Jul 18, 2019
CVE-2019-14234 9.8 CRITICAL 1 PoC Analysis EPSS 0.19
Django <1.11.23,2.1.11,2.2.4 - SQL Injection
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
CWE-89 Aug 09, 2019