Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 221 - 230 of 125130 in total

Microsoft CVE-2018-0993: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-0890: Active Directory Security Feature Bypass Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A security feature bypass vulnerability exists when Active Directory incorrectly applies Network Isolation settings. To exploit this vulnerability, an attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could bypass firewall policies applied to Modern Applications. This update cor...

Microsoft CVE-2018-1005: Microsoft SharePoint Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully explo...

Microsoft CVE-2018-0920: Microsoft Excel Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could ta...

Microsoft CVE-2018-4934: Security updates available for Adobe Flash Player Vulnerability

  • Severity: 4
  • Published: April 10, 2018
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address critical vulnerabilities where a successful exploitation could lead to arbitrary code execution in the context of the current user.

Microsoft CVE-2018-1009: Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

An elevation of privilege vulnerability exists when Windows improperly handles objects in memory and incorrectly maps kernel memory. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. An attacker who successfully exploited this vuln...

Microsoft CVE-2018-8116: Microsoft Graphics Component Denial of Service Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A denial of service vulnerability exists in the way that Windows handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. Note that the denial of service condition would not allow an attacker to execute code or to elevate user privileges. However, the denial of se...

Microsoft CVE-2018-0964: Hyper-V Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating...

Microsoft CVE-2018-1016: Microsoft Graphics Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user ri...