Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 81 - 90 of 130257 in total

Oracle Linux: (CVE-2018-10872) ELSA-2018-2164: kernel security and bug fix update Vulnerability

  • Severity: 4
  • Published: July 10, 2018

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From ELSA-2018-2164:

[2.6.32-754.2.1.OL6] - Update genkey [bug 25599697] [2.6.32-754.2.1] - [x86] entry/64: Don't use IST entry for #BP stack (Waiman Long) [1...

Microsoft CVE-2018-8300: Microsoft SharePoint Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account. Exploitation of this...

Microsoft CVE-2018-8280: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-8279: Microsoft Edge Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the...