High Severity Vulnerabilities

111.5K CVEs classified as high severity

HIGH
Total CVEs
111.5K
Vulnerabilities
Avg CVSS
7.7
High
Max CVSS
10.0
Highest
Min CVSS
7.2
Lowest

Browse by Severity

High Severity CVEs

Page 4610 of 4645
CVSS:10.0(Critical)

Buffer overflows in Tiny FTPd 0.52 beta3 FTP server allows users to execute commands via the STOR, RNTO, MKD, XMKD, RMD, XRMD, APPE, SIZE, and RNFR commands.

CVSS:7.2(High)

Buffer overflow in SCO scohelp program allows remote attackers to execute commands.

CVSS:10.0(Critical)

The Finger Server 0.82 allows remote attackers to execute commands via shell metacharacters.

CVSS:7.5(High)

The Webspeed configuration program does not properly disable access to the WSMadmin utility, which allows remote attackers to gain privileges via wsisa.dll.

CVSS:7.5(High)

wwwthreads does not properly cleanse numeric data or table names that are passed to SQL queries, which allows remote attackers to gain privileges for wwwthreads forums.

CVSS:7.5(High)

The shopping cart application provided with Filemaker allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:7.5(High)

The Remote Access Service invoke.cfm template in Allaire Spectra 1.0 allows users to bypass authentication via the bAuthenticated parameter.

CVSS:7.2(High)

The default configurations for McAfee Virus Scan and Norton Anti-Virus virus checkers do not check files in the RECYCLED folder that is used by the Windows Recycle Bin utility, which allows attackers ...

CVSS:7.2(High)

The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing.

CVSS:7.2(High)

The siteUserMod.cgi program in Cobalt RaQ2 servers allows any Site Administrator to modify passwords for other users, site administrators, and possibly admin (root).

CVSS:7.5(High)

Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag.

CVSS:7.5(High)

The SyGate Remote Management program does not properly restrict access to its administration service, which allows remote attackers to cause a denial of service, or access network traffic statistics.

CVSS:7.2(High)

The default installation of Debian GNU/Linux uses an insecure Master Boot Record (MBR) which allows a local user to boot from a floppy disk during the installation.

CVSS:7.5(High)

The RightFax web client uses predictable session numbers, which allows remote attackers to hijack user sessions.

CVSS:7.5(High)

The WebSiteTool shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:10.0(Critical)

The mcsp Client Site Processor system (MultiCSP) in Standard and Poor's ComStock is installed with several accounts that have no passwords or easily guessable default passwords.

CVSS:7.5(High)

The Intellivend shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:7.2(High)

Linux apcd program allows local attackers to modify arbitrary files via a symlink attack.

CVSS:7.5(High)

The EasyCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:7.5(High)

The Shoptron shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:7.5(High)

The SmartCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:7.5(High)

The SalesCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:7.5(High)

The Make-a-Store OrderPage shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.

CVSS:7.2(High)

The SMS Remote Control program is installed with insecure permissions, which allows local users to gain privileges by modifying or replacing the program.