High Severity Vulnerabilities

111.5K CVEs classified as high severity

HIGH
Total CVEs
111.5K
Vulnerabilities
Avg CVSS
8.6
High
Max CVSS
10.0
Highest
Min CVSS
7.2
Lowest

Browse by Severity

High Severity CVEs

Page 4633 of 4645
CVSS:10.0(Critical)

A Unix account with a name other than "root" has UID 0, i.e. root privileges.

CVSS:10.0(Critical)

A superfluous NFS server is running, but it is not importing or exporting any file systems.

CVSS:7.5(High)

A configuration in a web browser such as Internet Explorer or Netscape Navigator allows execution of active content such as ActiveX, Java, Javascript, etc.

CVSS:10.0(Critical)

A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.

CVSS:10.0(Critical)

A system is operating in "promiscuous" mode which allows it to perform packet sniffing.

CVSS:7.5(High)

A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc.

CVSS:7.5(High)

A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of.

CVSS:10.0(Critical)

The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable command...

CVSS:10.0(Critical)

An X server's access control is disabled (e.g. through an "xhost +" command) and allows anyone to connect to the server.

CVSS:10.0(Critical)

An unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign in /etc/hosts.equiv.

CVSS:10.0(Critical)

A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.