This is a list of recent vulnerabilities for which exploits are available.
CVE, Title, Vendor
Description
CVSS v3.1 Base Score
Date Created
Date Updated
CVE-2020-0796
Remote Code Execution Vulnerability in Microsoft SMB
Microsoft
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
10 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
03/12/2020
07/21/2021
CVE-2020-1953
Malicious File Upload Vulnerability in Apache Commons
Apache
Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.
10 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
03/13/2020
07/21/2021
CVE-2020-26821
Weak Authentication Vulnerability in SAP Solution Manager
SAP
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the SVG Converter Service, this has an impact to the integrity and availability of the service.
10 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H)
11/10/2020
07/21/2021
CVE-2021-35211
Remote Code Execution Vulnerability in SolarWind’s Serv-U
Solarwinds
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
An exploitable code execution vulnerability exists in the Shader functionality of AMD Radeon DirectX 11 Driver atidxx64.dll 26.20.15019.19000. An attacker can provide a specially crafted shader file to trigger this vulnerability, resulting in code execution. This vulnerability can be triggered from a HYPER-V guest using the RemoteFX feature, leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly).