Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Airflow | 0 ~ 2.6.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-30429 | 9.6 CRITICAL | Apache Pulsar: Incorrect Authorization for Function Worker when using mTLS Authentication |
| CVE-2023-37579 | 8.2 HIGH | Apache Pulsar Function Worker: Incorrect Authorization for Function Worker Can Leak Sink/S |
| CVE-2023-30428 | 8.2 HIGH | Apache Pulsar Broker: Incorrect Authorization Validation for Rest Producer |
| CVE-2022-42009 | 8.0 HIGH | Apache Ambari: A malicious authenticated user can remotely execute arbitrary code in the c |
| CVE-2022-45855 | 8.0 HIGH | Apache Ambari: Allows authenticated metrics consumers to perform RCE |
| CVE-2023-31007 | Apache Pulsar: Broker does not always disconnect client when authentication data expires | |
| CVE-2023-32200 | Apache Jena: Exposure of execution in script engine expressions. | |
| CVE-2023-35908 | Apache Airflow: Access to DAGs without relevant permission | |
| CVE-2023-22887 | Apache Airflow path traversal by authenticated user | |
| CVE-2022-46651 | Apache Airflow: Security vulnerability on AirFlow Connections | |
| CVE-2023-22888 | Apache Airflow: Scheduler remote DoS | |
| CVE-2023-37582 | Apache RocketMQ: Possible remote code execution when using the update configuration functi |
No comments yet