Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 1 - 10 of 134950 in total

Microsoft CVE-2018-8557: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-8550: Windows COM Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

An elevation of privilege exists in Windows COM Aggregate Marshaler. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not al...

Microsoft CVE-2018-8552: Windows Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

An information disclosure vulnerability exists when VBScript improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user’s computer or data. To exploit the vulnerability, an attacker must know the memory address of where the object was created. The update addresses the ...

Microsoft CVE-2018-8564: Microsoft Edge Spoofing Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content. An attacker who successfully exploited this vulnerability could trick a user into believing that the user was on a legitimate website. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vul...

CVE-2018-8577: Microsoft Excel Remote Code Execution Vulnerability [Office for Mac] Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could ta...

Microsoft CVE-2018-15978: Security updates available for Adobe Flash Player Vulnerability

  • Severity: 4
  • Published: November 13, 2018
Adobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS. These updates address an important vulnerability in Adobe Flash Player 31.0.0.122 and earlier versions.  Successful exploitation could lead to information disclosure.

Microsoft CVE-2018-8415: Microsoft PowerShell Tampering Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code. To exploit this vulnerability, an attacker would need to log on to the affected system and run a specially crafted application. The security update addresses the vulnerability by correcting log management of special characters.

Microsoft CVE-2018-8567: Microsoft Edge Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain. In a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability. I...