Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 41 - 50 of 134950 in total

Microsoft CVE-2018-8550: Windows COM Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

An elevation of privilege exists in Windows COM Aggregate Marshaler. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not al...

Microsoft CVE-2018-8562: Win32k Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rig...

Microsoft CVE-2018-8573: Microsoft Word Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of ...

Microsoft CVE-2018-8417: Microsoft JScript Security Feature Bypass Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A security feature bypass vulnerability exists in Microsoft JScript that could allow an attacker to bypass Device Guard. To exploit the vulnerability, an attacker would first have to access the local machine, and run a specially crafted application to create arbitrary COM objects. The update addresses the vulnerability by correcting how ...

Microsoft CVE-2018-8557: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-8564: Microsoft Edge Spoofing Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content. An attacker who successfully exploited this vulnerability could trick a user into believing that the user was on a legitimate website. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vul...

Microsoft CVE-2018-15978: Security updates available for Adobe Flash Player Vulnerability

  • Severity: 4
  • Published: November 13, 2018
Adobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS. These updates address an important vulnerability in Adobe Flash Player 31.0.0.122 and earlier versions.  Successful exploitation could lead to information disclosure.

Microsoft CVE-2018-8576: Microsoft Outlook Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf ...

Microsoft CVE-2018-8522: Microsoft Outlook Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf ...

Microsoft CVE-2018-8539: Microsoft Word Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: November 13, 2018

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of ...