High Severity Vulnerabilities

111.5K CVEs classified as high severity

HIGH
Total CVEs
111.5K
Vulnerabilities
Avg CVSS
9.2
Critical
Max CVSS
10.0
Highest
Min CVSS
7.5
Lowest

Browse by Severity

High Severity CVEs

Page 4640 of 4645
CVSS:7.5(High)

Buffer overflow in nnrpd program in INN up to version 1.6 allows remote users to execute arbitrary commands.

CVSS:7.5(High)

Livingston RADIUS code has a buffer overflow which can allow remote execution of commands as root.

CVSS:7.5(High)

Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords.

CVSS:10.0(Critical)

Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm.

CVSS:7.5(High)

Some filters or firewalls allow fragmented SYN packets with IP reserved bits in violation of their implemented policy.

CVSS:10.0(Critical)

Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service.

CWE-191999
CVSS:7.8(High)

Buffer overflow in FTP Serv-U 2.5 allows remote authenticated users to cause a denial of service (crash) via a long (1) CWD or (2) LS (list) command.

CVSS:10.0(Critical)

libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind.

CVSS:7.8(High)

Solaris rpc.mountd generates error messages that allow a remote attacker to determine what files are on the server.

CVSS:10.0(Critical)

Automount daemon automountd allows local or remote users to gain privileges via shell metacharacters.

CVSS:7.5(High)

Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command.

CVSS:10.0(Critical)

Sendmail 8.6.9 allows remote attackers to execute root commands, using ident.

CVSS:10.0(Critical)

In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program.