High Severity Vulnerabilities
111.5K CVEs classified as high severity
111.5K CVEs classified as high severity
An application-critical Windows NT registry key has an inappropriate value.
An application-critical Windows NT registry key has inappropriate permissions.
A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.
A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.
A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 an...
The OS/2 or POSIX subsystem in NT is enabled.
A component service related to NIS+ is running.
The rsh/rlogin service is running.
The Gopher service is running.
The discard service is running.
The NT Alerter and Messenger services are running.
The rexec service is running.
A system-critical Windows NT registry key has an inappropriate value.
In Windows NT, an inappropriate user is a member of a group, e.g. Administrator, Backup Operators, Domain Admins, Domain Guests, Power Users, Print Operators, Replicators, System Operators, etc.
A network intrusion detection system (IDS) does not properly reassemble fragmented packets.
A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets.
A network intrusion detection system (IDS) does not verify the checksum on a packet.
A network intrusion detection system (IDS) does not properly handle packets with improper sequence numbers.
A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection.
A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire.
A Windows NT log file has an inappropriate maximum size or retention period.
A Windows NT system does not restrict access to removable media drives such as a floppy disk drive or CDROM drive.
The Logon box of a Windows NT system displays the name of the last user who logged in.
An event log in Windows NT has inappropriate access permissions.