High Severity Vulnerabilities

111.5K CVEs classified as high severity

HIGH
Total CVEs
111.5K
Vulnerabilities
Avg CVSS
8.3
High
Max CVSS
10.0
Highest
Min CVSS
7.2
Lowest

Browse by Severity

High Severity CVEs

Page 4641 of 4645
CVSS:7.5(High)

The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands.

CVSS:10.0(Critical)

Windows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to log into the FTP server using any username and password.

CVSS:10.0(Critical)

Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.

CVSS:7.2(High)

Solaris rpcbind can be exploited to overwrite arbitrary files and gain root access.

CVSS:7.5(High)

Solaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is 111.

CVSS:10.0(Critical)

In Solaris, an SNMP subagent has a default community string that allows remote attackers to execute arbitrary commands as root, or modify system parameters.

CVSS:7.5(High)

In SunOS or Solaris, a remote user could connect from an FTP server's data port to an rlogin server on a host that trusts the FTP server, allowing remote command execution.

CVSS:10.0(Critical)

Samba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password.

CVSS:7.5(High)

Buffer overflow in the win-c-sample program (win-c-sample.exe) in the WebSite web server 1.1e allows remote attackers to execute arbitrary code via a long query string.

CVSS:7.5(High)

The uploader program in the WebSite web server allows a remote attacker to execute arbitrary programs.

CVSS:7.5(High)

Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access list.

CVSS:10.0(Critical)

NFS allows attackers to read and write any file on the system by specifying a false UID.

CVSS:7.5(High)

The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have tak...

CVSS:7.2(High)

In older versions of Sendmail, an attacker could use a pipe character to execute root commands.

CVSS:7.5(High)

In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering.

CVSS:7.5(High)

Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections.

CVSS:7.5(High)

The ghostscript command with the -dSAFER option allows remote attackers to execute commands.