Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 31 - 40 of 90423 in total

Microsoft CVE-2017-0188: Win32k Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2017

A Win32k information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker would have to log on to an affected system and run a sp...

Microsoft CVE-2017-0205: Microsoft Edge Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2017

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the...

Microsoft CVE-2017-0186: Hyper-V Denial of Service Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2017

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a pri...

SUSE: CVE-2017-3064: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: April 10, 2017

Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability when parsing a shape outline. Successful exploitation could lead to arbitrary code execution.

Apache Tomcat: Low: Information Disclosure (CVE-2017-5648) Vulnerability

  • Severity: 4
  • Published: April 10, 2017

While investigating bug 60718, it was noticed that some calls to application listeners did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and t...

Cent OS: CVE-2017-2668: CESA-2017:0920 (389-ds-base) Vulnerability

  • Severity: 4
  • Published: April 10, 2017

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From RHSA-2017:0893:

389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (...

Microsoft CVE-2017-0182: Hyper-V Denial of Service Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2017

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a pri...

Microsoft CVE-2017-0160: .NET Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2017

A remote code execution vulnerability exists when Microsoft .NET Framework fails to properly validate input before loading libraries. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full u...

Microsoft CVE-2017-0191: Windows Denial of Service Vulnerability Vulnerability

  • Severity: 4
  • Published: April 10, 2017

A denial of service vulnerability exists in the way that Windows handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. Note that the denial of service condition would not allow an attacker to execute code or to elevate user privileges. However, the denial of se...

Oracle Linux: CVE-2017-2668: ELSA-2017-0920 - 389-ds-base security and bug fix update Vulnerability

  • Severity: 4
  • Published: April 10, 2017

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From RHSA-2017:0893:

389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (...