High Severity Vulnerabilities
111.5K CVEs classified as high severity
111.5K CVEs classified as high severity
Mediahouse Statistics Server allows remote attackers to read the administrator password, which is stored in cleartext in the ss.cfg file.
Apache allows remote attackers to conduct a denial of service via a large number of MIME headers.
Sample runnable code snippets in ColdFusion Server 4.0 allow remote attackers to read files, conduct a denial of service, or use the server as a proxy for other HTTP calls.
Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command.
A memory leak in a Motorola CableRouter allows remote attackers to conduct a denial of service via a large number of telnet connections.
Denial of service in various Windows systems via malformed, fragmented IGMP packets.
Buffer overflow in the FTP client in the Debian GNU/Linux netstd package.
dfire.cgi script in Dragon-Fire IDS allows remote users to execute commands via shell metacharacters.
Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
Buffer overflow in sccw allows local users to gain root access via the HOME environmental variable.
genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767.
ypserv allows local administrators to modify password tables.
ypserv allows a local user to modify the GECOS and login shells of other users.
Buffer overflow in rpc.yppasswdd allows a local user to gain privileges via MD5 hash generation.
The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider.
Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request.
Buffer overflow in RealNetworks RealServer administration utility allows remote attackers to execute arbitrary commands via a long username and password.
Firewall-1 does not properly restrict access to LDAP attributes.
Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.
iHTML Merchant allows remote attackers to obtain sensitive information or execute commands via a code parsing error.
Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set.
The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager.
Zeus web server allows remote attackers to read arbitrary files by specifying the file name in an option to the search engine.