This is a list of recent vulnerabilities for which exploits are available.
CVE, Title, Vendor
Description
CVSS v3.1 Base Score
Date Created
Date Updated
CVE-2020-35184
Weak Authentication Vulnerability in Official Docker Compose
Docker
The official composer docker images before 1.8.3 contain a blank password for a root user. System using the composer docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
12/16/2020
07/08/2021
CVE-2021-34458
Windows Kernel Remote Code Execution Vulnerability
Windows
This issue allows an SR-IOV device which is assigned to a guest to potentially interfere with its PCIe siblings which are attached to other guests or to the root. In short, SR-IOV devices allow your virtual machines to share resources on a single, physical interface on your server.
9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)
07/16/2021
07/16/2021
CVE-2021-21513
Weak Authentication Vulnerability in Dell EMC OpenManage
Dell
Dell EMC OpenManage Server Administrator (OMSA) version 9.5 Microsoft Windows installations with Distributed Web Server (DWS) enabled configuration contains an authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to gain admin access on the affected system.
Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
03/02/2021
07/13/2021
CVE-2021-22911
Improper Input Validation Vulnerability in Rocket Chat Server
Rocket Chat
A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
05/27/2021
07/07/2021
CVE-2021-34527
Windows Print Spooler Remote Code Execution Vulnerability
Microsoft
The Print Spooler remote code execution vulnerability takes advantage of the RpcAddPrinterDriver function call in the Print Spooler service that allows clients to add arbitrary dll files as printer drivers and load them as SYSTEM (the spooler service context).