High Severity Vulnerabilities
111.5K CVEs classified as high severity
111.5K CVEs classified as high severity
Buffer overflow in VDO Live Player allows remote attackers to execute commands on the VDO client via a malformed .vdo file.
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
Buffer overflow in Infoseek Ultraseek search engine allows remote attackers to execute commands via a long GET request.
Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Ide...
Modifications to ACLs (Access Control Lists) in Microsoft Exchange 5.5 do not take effect until the directory store cache is refreshed.
HP VirtualVault with the PHSS_17692 patch allows unprivileged processes to bypass access restrictions via the Trusted Gateway Proxy (TGP).
Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote attackers to execute commands via the vnd.ms.radio protocol.
UnixWare pkgtrans allows local users to read arbitrary files via a symlink attack.
Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name.
CC Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
Matt's Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
Whois Internic Lookup program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
The Sun Web-Based Enterprise Management (WBEM) installation script stores a password in plaintext in a world readable file.
The SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init before the privileged process is executed.
htdig allows remote attackers to execute commands via filenames with shell metacharacters.
Buffer overflow in Solaris sadmind allows remote attackers to gain root privileges using a NETMGT_PROC_SERVICE request.
Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service.
Buffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode.
Buffer overflow in Xshipwars xsw program.
Buffer overflow in Exim allows local users to gain root privileges via a long :include: option in a .forward file.
Buffer overflow in BNC IRC proxy allows remote attackers to gain privileges.
Buffer overflow in the HTML library used by Internet Explorer, Outlook Express, and Windows Explorer via the res: local resource protocol.
Buffer overflow in Solaris getopt in libc allows local users to gain root privileges via a long argv[0].
Buffer overflow in FreeBSD setlocale in the libc module allows attackers to execute arbitrary code via a long PATH_LOCALE environment variable.