Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 151 - 160 of 130271 in total

Microsoft CVE-2018-8238: Skype for Business and Lync Security Feature Bypass Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A security feature bypass vulnerability exists when Skype for Business or Lync do not properly parse UNC path links shared via messages. An attacker who successfully exploited the vulnerability could execute arbitrary commands in the context of the logged-in user. The security feature bypass by itself does not allow arbitrary code execut...

OS X update for DesktopServices (CVE-2018-4178) Vulnerability

  • Severity: 4
  • Published: July 10, 2018
A permissions issue existed in which execute permission was incorrectly granted. This issue was addressed with improved permission validation.

Microsoft CVE-2018-8125: Microsoft Edge Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the...

Microsoft CVE-2018-8290: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...