Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 81 - 90 of 137903 in total

Microsoft CVE-2019-0676: Internet Explorer Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: February 12, 2019

An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk. For an attack to be successful, an attacker must persuade a user to open a malicious website. The security update addresses the...

Microsoft CVE-2019-0686: Microsoft Exchange Server Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: February 12, 2019

An elevation of privilege vulnerability exists in Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could gain the same rights as any other user of the Exchange server. This could allow the attacker to perform activities such as accessing the mailboxes of other users. Exploitation of this vulnerability ...

Microsoft CVE-2019-0631: Windows Security Feature Bypass Vulnerability Vulnerability

  • Severity: 4
  • Published: February 12, 2019

A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and the...

Microsoft CVE-2019-0590: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: February 12, 2019

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same ...