Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 231 - 240 of 125130 in total

Microsoft CVE-2018-1013: Microsoft Graphics Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user ri...

Microsoft CVE-2018-1012: Microsoft Graphics Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user ri...

Microsoft CVE-2018-0988: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the sa...

Microsoft CVE-2018-1009: Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

An elevation of privilege vulnerability exists when Windows improperly handles objects in memory and incorrectly maps kernel memory. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. An attacker who successfully exploited this vuln...

Microsoft CVE-2018-0994: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-0990: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-0966: Device Guard Security Feature Bypass Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2018

A security feature bypass exists when Device Guard incorrectly validates an untrusted file. An attacker who successfully exploited this vulnerability could make an unsigned file appear to be signed. Because Device Guard relies on the signature to determine the file is non-malicious, Device Guard could then allow a malicious file to execu...