Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 51 - 60 of 131376 in total

Microsoft CVE-2018-8273: Microsoft SQL Server Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A buffer overflow vulnerability exists in the Microsoft SQL Server that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could execute code in the context of the SQL Server Database Engine service account. To exploit the vulnerability, an attacker would need to submit a sp...

VMware Workstation: Vulnerability (VMSA-2018-0020) (CVE-2018-3646) Vulnerability

  • Severity: 5
  • Published: August 14, 2018

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

Microsoft CVE-2018-8399: Win32k Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rig...

Microsoft CVE-2018-8342: Windows NDIS Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it. To exploit the vulnerability, in a local attack scenario, an attacker could run a specially crafted application to elevate the attacker's privilege level. A...

Microsoft CVE-2018-8371: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the sa...

Microsoft CVE-2018-8370: Microsoft Edge Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A information disclosure vulnerability exists when WebAudio Library improperly handles audio requests. An attacker who has successfully exploited this vulnerability might be able to read privileged data across trust boundaries. In browsing scenarios, an attacker could convince a user to visit a malicious site and leverage the vulnerabili...

Microsoft CVE-2018-8380: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-8348: Windows Kernel Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially ...