Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2015-05-25 CVE-2014-2174 Improper Access Control vulnerability in Cisco Telepresence TC Software and Telepresence TE Software
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.
low complexity
cisco CWE-284
8.3
2015-05-21 CVE-2015-3911 Improper Access Control vulnerability in Huawei E587 Mobile Wifi Firmware
Huawei E587 Mobile WiFi with firmware before 11.203.30.00.00 allows remote attackers to bypass authentication, change configurations, send messages, and cause a denial of service (device restart) via unspecified vectors.
network
low complexity
huawei CWE-284
critical
9.0
2015-05-20 CVE-2015-1920 Improper Access Control vulnerability in IBM Websphere Application Server
IBM WebSphere Application Server (WAS) 6.1 through 6.1.0.47, 7.0 before 7.0.0.39, 8.0 before 8.0.0.11, and 8.5 before 8.5.5.6 allows remote attackers to execute arbitrary code by sending crafted instructions in a management-port session.
network
low complexity
ibm CWE-284
critical
10.0
2015-05-19 CVE-2015-3407 Improper Access Control vulnerability in multiple products
Module::Signature before 0.74 allows remote attackers to bypass signature verification for files via a signature file that does not list the files.
network
low complexity
canonical module-signature-project CWE-284
5.0
2015-05-18 CVE-2015-3306 Improper Access Control vulnerability in Proftpd 1.3.5
The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
network
low complexity
proftpd CWE-284
critical
10.0
2015-05-14 CVE-2015-3644 Improper Access Control vulnerability in Stunnel
Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.
network
stunnel CWE-284
5.8
2015-05-13 CVE-2015-3074 Improper Access Control vulnerability in multiple products
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, and CVE-2015-3073.
network
low complexity
adobe apple microsoft CWE-284
critical
10.0
2015-05-13 CVE-2015-3073 Improper Access Control vulnerability in multiple products
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, and CVE-2015-3074.
network
low complexity
adobe apple microsoft CWE-284
critical
10.0
2015-05-13 CVE-2015-3072 Improper Access Control vulnerability in multiple products
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3073, and CVE-2015-3074.
network
low complexity
adobe apple microsoft CWE-284
critical
10.0
2015-05-13 CVE-2015-3071 Improper Access Control vulnerability in multiple products
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074.
network
low complexity
adobe apple microsoft CWE-284
critical
10.0