Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 171 - 180 of 127344 in total

Microsoft CVE-2018-0959: Hyper-V Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to e...

Microsoft CVE-2018-8168: Microsoft SharePoint Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully explo...

Microsoft CVE-2018-8124: Win32k Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rig...

Microsoft CVE-2018-8166: Win32k Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rig...

Microsoft CVE-2018-8130: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-8142: Windows Security Feature Bypass Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018
A security feature bypass exists when Windows incorrectly validates kernel driver signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed drivers into the kernel. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed drivers ...

Microsoft CVE-2018-8137: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same ...

Microsoft CVE-2018-8170: Windows Image Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security up...

Microsoft CVE-2018-0946: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same ...