High Severity Vulnerabilities
111.5K CVEs classified as high severity
111.5K CVEs classified as high severity
The DG/UX finger daemon allows remote command execution through shell metacharacters.
The SATAN session key may be disclosed if the user points the web browser to other sites, possibly allowing root access.
The Perl fingerd program allows arbitrary command execution from remote users.
The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack.
The handler CGI program in IRIX allows arbitrary command execution.
The aglimpse CGI program of the Glimpse package allows remote execution of arbitrary commands.
The campas CGI program provided with some NCSA web servers allows an attacker to execute arbitrary commands via encoded carriage return characters in the query string, as demonstrated by reading the p...
Sendmail WIZ command enabled, allowing root access.
The Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts.
Buffer overflow in Solaris x86 mkcookie allows local users to obtain root access.
The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
The dip program on many Linux systems allows local users to gain root access via a buffer overflow.
Kodak Color Management System (KCMS) on Solaris allows a local user to write to arbitrary files and gain root access.
admintool in Solaris allows a local user to write to arbitrary files and gain root access.
vold in Solaris 2.x allows local users to gain root access.
Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.
Local users can start Sendmail in daemon mode and gain root privileges.
swinstall and swmodify commands in SD-UX package in HP-UX systems allow local users to create or overwrite arbitrary files to gain root access.
SGI IRIX buffer overflow in xterm and Xaw allows root access.
Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon.
Buffer overflow in AIX lchangelv gives root access.
Buffer overflow in dtaction command gives root access.
Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root.
Windows NT 4.0 beta allows users to read and delete shares.