Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 1 - 10 of 134933 in total

Microsoft CVE-2018-8551: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-8573: Microsoft Word Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of ...

Microsoft CVE-2018-8544: Windows VBScript Engine Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the ...

Microsoft CVE-2018-8562: Win32k Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rig...

Microsoft CVE-2018-8577: Microsoft Excel Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could ta...

Microsoft CVE-2018-8546: Microsoft Skype for Business Denial of Service Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A denial of service vulnerability exists in Skype for Business. An attacker who successfully exploited the vulnerability could cause Skype for Business to stop responding. Note that the denial of service would not allow an attacker to execute code or to elevate the attacker's user rights. For an attack to be successful, this vulnerabilit...

Microsoft CVE-2018-8407: MSRPC Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

An information disclosure vulnerability exists when "Kernel Remote Procedure Call Provider" driver improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further comp...

Microsoft CVE-2018-8485: DirectX Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerabi...

Microsoft CVE-2018-8256: Microsoft PowerShell Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system. To exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system. The security update fi...