Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 11 - 20 of 120863 in total

Microsoft CVE-2017-11890: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the c...

Microsoft CVE-2017-11889: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same ...

Microsoft CVE-2017-11893: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same ...

Microsoft CVE-2017-11887: Scripting Engine Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, in a web-based attack scenario, an attacker could host a website in an attempt...

Microsoft CVE-2017-11886: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the c...

Microsoft CVE-2017-11888: Microsoft Edge Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the...

Microsoft CVE-2017-11894: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same u...