High Severity Vulnerabilities

111.5K CVEs classified as high severity

HIGH
Total CVEs
111.5K
Vulnerabilities
Avg CVSS
8.5
High
Max CVSS
10.0
Highest
Min CVSS
7.2
Lowest

Browse by Severity

High Severity CVEs

Page 4643 of 4645
CVSS:10.0(Critical)

Some implementations of rlogin allow root access if given a -froot parameter.

CWE-881999
CVSS:7.2(High)

The printers program in IRIX has a buffer overflow that gives root access to local users.

CVSS:7.5(High)

Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line.

CVSS:10.0(Critical)

Buffer overflow in AIX and Solaris "gethostbyname" library call allows root access through corrupt DNS host names.

CVSS:10.0(Critical)

Buffer overflow in syslog utility allows local or remote attackers to gain root privileges.

CVSS:10.0(Critical)

Buffer overflow in SMTP HELO command in Sendmail allows a remote attacker to hide activities.

CVSS:10.0(Critical)

The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).

CVSS:10.0(Critical)

The debug command in Sendmail is enabled, allowing attackers to execute commands as root.

CVSS:7.2(High)

AIX nslookup command allows local users to obtain root access by not dropping privileges correctly.

CVSS:7.2(High)

Various vulnerabilities in the AIX portmir command allows local users to obtain root access.

CVSS:7.2(High)

Buffer overflow in AIX libDtSvc library can allow local users to gain root access.

CVSS:10.0(Critical)

IRIX and AIX automountd services (autofsd) allow remote users to execute root commands.

CVSS:7.5(High)

Buffer overflow in rwhod on AIX and other operating systems allows remote attackers to execute arbitrary code via a UDP packet with a long hostname.

CVSS:10.0(Critical)

Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "...

CVSS:10.0(Critical)

Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access.