Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 241 - 250 of 121935 in total

Microsoft CVE-2018-0780: Scripting Engine Information Disclosure Vulnerability Vulnerability

  • Severity: 3
  • Published: January 02, 2018

An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. In a web-based attack scenario, an attacker could host a website in an attempt to...

Microsoft CVE-2018-0751: Windows Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: January 02, 2018

An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. To exploit the vulnerability, a locally authenticated attacker could ru...

Microsoft CVE-2018-0777: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 8
  • Published: January 02, 2018

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same ...

Microsoft CVE-2018-0744: Windows Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: January 02, 2018

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To explo...

Microsoft CVE-2018-0741: Microsoft Color Management Information Disclosure Vulnerability Vulnerability

  • Severity: 3
  • Published: January 02, 2018

An information disclosure vulnerability exists in the way that the Color Management Module (ICM32.dll) handles objects in memory. This vulnerability allows an attacker to retrieve information to bypass usermode ASLR (Address Space Layout Randomization) on a targeted system. By itself, the information disclosure does not allow arbitrary c...

Microsoft CVE-2018-0743: Windows Subsystem for Linux Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: January 02, 2018

An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addr...

Microsoft CVE-2018-0749: SMB Server Elevation of Privilege Vulnerability Vulnerability

  • Severity: 5
  • Published: January 02, 2018

An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) Server when an attacker with valid credentials attempts to open a specially crafted file over the SMB protocol on the same machine. An attacker who successfully exploited this vulnerability could bypass certain security checks in the operating syst...

Microsoft CVE-2018-0752: Windows Elevation of Privilege Vulnerability Vulnerability

  • Severity: 5
  • Published: January 02, 2018

An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. To exploit the vulnerability, a locally authenticated attacker could ru...