Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Airflow | Apache Airflow ~ 2.1.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Missing Authentication on Critical component CVE-2021-38540 | https://github.com/Captain-v-hook/PoC-for-CVE-2021-38540- | POC Details |
| 2 | Apache Airflow Airflow >=2.0.0 and <2.1.3 does not protect the variable import endpoint which allows unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-38540.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-37579 | Bypass deserialization checks in Apache Dubbo | |
| CVE-2021-36161 | Unprotected input value toString cause RCE |
No comments yet