Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 101 - 110 of 123081 in total

SUSE: CVE-2018-7051: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: February 14, 2018

An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. Certain nick names could result in out-of-bounds access when printing theme strings.

Ubuntu: USN-3570-1 (CVE-2018-1056): AdvanceCOMP vulnerability Vulnerability

  • Severity: 4
  • Published: February 13, 2018

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From USN-3570-1:

Joonun Jang discovered that AdvanceCOMP incorrectly handled certain malformed zip files. If a user or automated system were tricked into proce...

Microsoft CVE-2018-0742: Windows Kernel Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: February 12, 2018

An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update a...

Microsoft CVE-2018-0755: Windows EOT Font Engine Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: February 12, 2018

An information disclosure vulnerability exists in the way that the Microsoft Windows Embedded OpenType (EOT) font engine parses specially crafted embedded fonts. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. Note that while this vulnerability would not allow a...