Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 71 - 80 of 128930 in total

Microsoft CVE-2018-1040: Windows Code Integrity Module Denial of Service Vulnerability Vulnerability

  • Severity: 5
  • Published: June 12, 2018

A denial of service vulnerability exists in the way that the Windows Code Integrity Module performs hashing. An attacker who successfully exploited the vulnerability could cause a system to stop responding. Note that the denial of service condition would not allow an attacker to execute code or to elevate user privileges. However, the de...

Microsoft CVE-2018-8235: Microsoft Edge Security Feature Bypass Vulnerability Vulnerability

  • Severity: 4
  • Published: June 12, 2018

A security feature bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins. The vulnerability allows Microsoft Edge to bypass Same-Origin Policy (SOP) restrictions, and to allow requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force the brow...

Microsoft CVE-2018-8224: Windows Kernel Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: June 12, 2018

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To explo...

Microsoft CVE-2018-8246: Microsoft Excel Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: June 12, 2018

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to o...

Microsoft CVE-2018-8239: Windows GDI Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: June 12, 2018

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincin...

Microsoft CVE-2018-8207: Windows Kernel Information Disclosure Vulnerability Vulnerability

  • Severity: 2
  • Published: June 12, 2018

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially ...

Microsoft CVE-2018-0978: Internet Explorer Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: June 12, 2018

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the c...

Microsoft CVE-2018-8231: HTTP Protocol Stack Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: June 12, 2018

A remote code execution vulnerability exists when HTTP Protocol Stack (Http.sys) improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of the affected system. To exploit the vulnerability, in most situations, an unauthenticated attacker could send a s...

Microsoft CVE-2018-8267: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: June 12, 2018

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the sa...

Microsoft CVE-2018-8208: Windows Desktop Bridge Elevation of Privilege Vulnerability Vulnerability

  • Severity: 7
  • Published: June 12, 2018

An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights...