High Severity Vulnerabilities
111.5K CVEs classified as high severity
111.5K CVEs classified as high severity
Buffer overflow in nnrpd program in INN up to version 1.6 allows remote users to execute arbitrary commands.
HP Remote Watch allows a remote user to gain root access.
Livingston RADIUS code has a buffer overflow which can allow remote execution of commands as root.
Linux cfingerd could be exploited to gain root access.
Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords.
Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm.
Some filters or firewalls allow fragmented SYN packets with IP reserved bits in violation of their implemented policy.
php.cgi allows attackers to read any file on the system.
Remote execution of arbitrary commands through Guestbook CGI program.
Buffer overflow in NCSA WebServer (1.4.1 and below) gives remote access.
IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files.
Buffer overflow in NCSA WebServer (version 1.5c) gives remote access.
Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service.
Attackers can do a denial of service of IRC by crashing the server.
Buffer overflow in FTP Serv-U 2.5 allows remote authenticated users to cause a denial of service (crash) via a long (1) CWD or (2) LS (list) command.
Denial of service by sending forged ICMP unreachable packets.
libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind.
Solaris rpc.mountd generates error messages that allow a remote attacker to determine what files are on the server.
Automount daemon automountd allows local or remote users to gain privileges via shell metacharacters.
rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.
Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command.
MIME buffer overflow in Sendmail 8.8.0 and 8.8.1 gives root access.
Sendmail 8.6.9 allows remote attackers to execute root commands, using ident.
In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program.