High Severity Vulnerabilities

111.5K CVEs classified as high severity

HIGH
Total CVEs
111.5K
Vulnerabilities
Avg CVSS
7.8
High
Max CVSS
10.0
Highest
Min CVSS
7.2
Lowest

Browse by Severity

High Severity CVEs

Page 4609 of 4645
CVSS:10.0(Critical)

DNSTools CGI applications allow remote attackers to execute arbitrary commands via shell metacharacters.

CVSS:10.0(Critical)

Buffer overflow in StarOffice StarScheduler web server allows remote attackers to gain root access via a long GET command.

CVSS:7.2(High)

The mtr program only uses a seteuid call when attempting to drop privileges, which could allow local users to gain root privileges.

CVSS:7.2(High)

atsadc in the atsar package for Linux does not properly check the permissions of an output file, which allows local users to gain root privileges.

CVSS:7.2(High)

Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.

CVSS:7.5(High)

Batch files in the Oracle web listener ows-bin directory allow remote attackers to execute commands via a malformed URL that includes '?&'.

CVSS:10.0(Critical)

Buffer overflow in the InterAccess telnet server TelnetD allows remote attackers to execute commands via a long login name.

CVSS:7.5(High)

The Delegate application proxy has several buffer overflows which allow a remote attacker to execute commands.

CVSS:7.2(High)

The installation of Sun Internet Mail Server (SIMS) creates a world-readable file that allows local users to obtain passwords.

CVSS:7.5(High)

Sample web sites on Microsoft Site Server 3.0 Commerce Edition do not validate an identification number, which allows remote attackers to execute SQL commands.

CVSS:7.6(High)

The Microsoft Active Setup ActiveX component in Internet Explorer 4.x and 5.x allows a remote attacker to install software components without prompting the user by stating that the software's manufact...

CVSS:7.5(High)

HP Ignite-UX does not save /etc/passwd when it creates an image of a trusted system, which can set the password field to a blank and allow an attacker to gain privileges.

CVSS:7.5(High)

Buffer overflow in MMDF server allows remote attackers to gain privileges via a long MAIL FROM command to the SMTP daemon.

CVSS:7.2(High)

NetBSD ptrace call on VAX allows local users to gain privileges by modifying the PSL contents in the debugging process.

CVSS:7.2(High)

Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when other users access a drive.

CWE-942000
CVSS:7.5(High)

Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a cl...

CVSS:7.5(High)

MySQL 3.22 allows remote attackers to bypass password authentication and access a database via a short check string.

CVSS:7.5(High)

The libguile.so library file used by gnucash in Debian GNU/Linux is installed with world-writable permissions.

CVSS:7.5(High)

Axis 700 Network Scanner does not properly restrict access to administrator URLs, which allows users to bypass the password protection via a .. (dot dot) attack.

CVSS:10.0(Critical)

Infopop Ultimate Bulletin Board (UBB) allows remote attackers to execute commands via shell metacharacters in the topic hidden field.

CVSS:7.5(High)

The CartIt shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:7.5(High)

The Cart32 shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:7.5(High)

The @Retail shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:7.5(High)

The Check It Out shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.