High Severity Vulnerabilities
111.5K CVEs classified as high severity
111.5K CVEs classified as high severity
A system does not present an appropriate legal message or warning to a user who is accessing it.
A system-critical Windows NT registry key has inappropriate permissions.
A filter in a router or firewall allows unusual fragmented packets.
A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data.
A Windows NT file system is not NTFS.
There is a one-way or two-way trust relationship between Windows NT domains.
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.
The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions.
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys.
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Chan...
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts.
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.
A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.
rpc.admind in Solaris is not running in a secure mode.
A Sendmail alias allows input to be piped to a program.
An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a password) or to become disabled.
The registry in Windows NT can be accessed remotely by users who are not administrators.
IIS has the #exec function enabled for Server Side Include (SSI) files.
A system-critical Windows NT file or directory has inappropriate permissions.
A system-critical Unix file or directory has inappropriate permissions.
Two or more Unix accounts have the same UID.