Vulnerability Details : CVE-2014-4650
The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
Vulnerability category: Directory traversal
Threat overview for CVE-2014-4650
Top countries where our scanners detected CVE-2014-4650
Top open port discovered on systems with this issue
53
IPs affected by CVE-2014-4650 782,448
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-4650!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-4650
26.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less