Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 41 - 50 of 131376 in total

Microsoft CVE-2018-8397: GDI+ Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with ful...

Microsoft CVE-2018-8348: Windows Kernel Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially ...

Red Hat: CVE-2018-12827: Important: flash-plugin security update (RHSA-2018:2435) Vulnerability

  • Severity: 4
  • Published: August 14, 2018

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From RHSA-2018:2435:

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.

This update upgrades Fl...

VMware Workstation: Vulnerability (VMSA-2018-0020) (CVE-2018-3646) Vulnerability

  • Severity: 5
  • Published: August 14, 2018

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

IBM HTTP Server: CVE-2016-4975: mod_userdir CRLF injection Vulnerability

  • Severity: 4
  • Published: August 14, 2018

Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Serve...

Microsoft CVE-2018-8353: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the sa...

Microsoft CVE-2018-8399: Win32k Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rig...

CVE-2018-8375: Microsoft Excel Remote Code Execution Vulnerability [Office for Mac] Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could ta...