Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 181 - 190 of 127344 in total

Microsoft CVE-2018-1025: Microsoft Browser Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

An information disclosure vulnerability exists when affected Microsoft browsers improperly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, in a web-based attack scenario, an attacker could host a website tha...

Microsoft CVE-2018-8155: Microsoft SharePoint Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully explo...

Microsoft CVE-2018-8137: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same ...

Microsoft CVE-2018-8147: Microsoft Excel Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could ta...

Microsoft CVE-2018-8163: Microsoft Excel Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to o...

Microsoft CVE-2018-8156: Microsoft SharePoint Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully explo...

Microsoft CVE-2018-8134: Windows Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. To exploit the vulnerability, a locally authenticated attacker could ru...

Microsoft CVE-2018-8142: Windows Security Feature Bypass Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018
A security feature bypass exists when Windows incorrectly validates kernel driver signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed drivers into the kernel. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed drivers ...

Microsoft CVE-2018-8127: Windows Kernel Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially ...

Microsoft CVE-2018-8157: Microsoft Office Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: May 08, 2018

A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could t...