Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 91 - 100 of 127679 in total

Debian: CVE-2018-5155: firefox-esr -- security update Vulnerability

  • Severity: 4
  • Published: May 09, 2018

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From DSA-4199:

Several security issues have been found in the Mozilla Firefox web

browser: Multiple memory safety errors and other implementation er...

Red Hat: CVE-2018-5154: Critical: firefox security update ((Multiple Advisories)) Vulnerability

  • Severity: 4
  • Published: May 09, 2018

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From RHSA-2018:1415:

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update up...

SUSE: CVE-2018-5176: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: May 09, 2018

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From SUSE_CVE-2018-5176:

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur...

MFSA2018-11 Firefox: Security vulnerabilities fixed in Firefox 60 (CVE-2018-5165) Vulnerability

  • Severity: 4
  • Published: May 09, 2018

In 32-bit versions of Firefox, the Adobe Flash plugin setting for "Enable Adobe Flash protected mode" is unchecked by default even though the Adobe Flash sandbox is actually enabled. The displayed state is the reverse of the true setting, resulting in user confusion. This could cause users to select this setting intending to activate it ...