Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2015-07-09 CVE-2015-3116 Improper Access Control vulnerability in Adobe products
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3125, and CVE-2015-5116.
network
low complexity
adobe apple microsoft linux CWE-284
5.0
2015-07-09 CVE-2015-3115 Improper Access Control vulnerability in Adobe products
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3116, CVE-2015-3125, and CVE-2015-5116.
network
low complexity
adobe linux apple microsoft CWE-284
5.0
2015-07-09 CVE-2015-3114 Improper Access Control vulnerability in Adobe products
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
network
low complexity
adobe linux apple microsoft CWE-284
5.0
2015-07-09 CVE-2014-0578 Improper Access Control vulnerability in Adobe products
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, and CVE-2015-5116.
network
low complexity
adobe linux apple microsoft CWE-284
5.0
2015-07-06 CVE-2015-4034 Improper Access Control vulnerability in Samsung Galaxy S5
The createFromParcel method in the com.absolute.android.persistence.MethodSpec class in Samsung Galaxy S5s allows remote attackers to execute arbitrary files via a crafted Parcelable object in a serialized MethodSpec object.
7.9
2015-07-03 CVE-2015-3692 Improper Access Control vulnerability in Apple mac OS X
Apple Mac EFI before 2015-001, as used in OS X before 10.10.4 and other products, does not enforce a locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging root privileges.
local
low complexity
apple CWE-284
6.8
2015-07-03 CVE-2015-3691 Improper Access Control vulnerability in Apple mac OS X
The Monitor Control Command Set kernel extension in the Display Drivers subsystem in Apple OS X before 10.10.4 allows attackers to execute arbitrary code in a privileged context via a crafted app that leverages control of a function pointer.
network
apple CWE-284
critical
9.3
2015-07-03 CVE-2015-3675 Improper Access Control vulnerability in Apple mac OS X
The default configuration of the Apache HTTP Server on Apple OS X before 10.10.4 does not enable the mod_hfs_apple module, which allows remote attackers to bypass HTTP authentication via a crafted URL.
network
low complexity
apple CWE-284
5.0
2015-07-03 CVE-2015-3672 Improper Access Control vulnerability in Apple mac OS X
Admin Framework in Apple OS X before 10.10.4 does not properly handle authentication errors, which allows local users to obtain admin privileges via unspecified vectors.
local
low complexity
apple CWE-284
7.2
2015-07-03 CVE-2015-3671 Improper Access Control vulnerability in Apple mac OS X
Admin Framework in Apple OS X before 10.10.4 does not properly verify XPC entitlements, which allows local users to bypass authentication and obtain admin privileges via unspecified vectors.
local
low complexity
apple CWE-284
7.2