Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2017-10-17 CVE-2014-2277 Improper Access Control vulnerability in Perltidy Project Perltidy
The make_temporary_filename function in perltidy 20120701-1 and earlier allows local users to obtain sensitive information or write to arbitrary files via a symlink attack, related to use of the tmpnam function.
local
low complexity
perltidy-project CWE-284
7.1
2017-10-17 CVE-2014-9489 Improper Access Control vulnerability in Gollum Project Gollum
The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string "master" is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the -O or --open-files-in-pager flags.
network
low complexity
gollum-project CWE-284
8.8
2017-10-16 CVE-2014-9148 Improper Access Control vulnerability in Fiyo CMS
Fiyo CMS 2.0.1.8 allows remote attackers to bypass intended access restrictions and execute the (1) "Install and Update" or (2) Backup super administrator function via the view parameter in a direct request to fiyo/dapur.
network
low complexity
fiyo CWE-284
critical
9.8
2017-10-10 CVE-2016-10514 Improper Access Control vulnerability in Piwigo
url_check_format in include/functions.inc.php in Piwigo before 2.8.3 allows remote attackers to bypass intended access restrictions via a URL that contains a " character, or a URL beginning with a substring other than the http:// or https:// substring.
network
low complexity
piwigo CWE-284
6.5
2017-09-28 CVE-2015-1336 Improper Access Control vulnerability in Man-Db Project Man-Db
The daily mandb cleanup job in Man-db before 2.7.6.1-1 as packaged in Ubuntu and Debian allows local users with access to the man account to gain privileges via vectors involving insecure chown use.
local
low complexity
man-db-project CWE-284
7.8
2017-09-25 CVE-2015-7315 Improper Access Control vulnerability in Plone
Plone 3.3.0 through 3.3.6, 4.0.0 through 4.0.10, 4.1.0 through 4.1.6, 4.2.0 through 4.2.7, 4.3.0 through 4.3.6, and 5.0rc1 allows remote attackers to add a new member to a Plone site with registration enabled, without acknowledgment of site administrator.
network
high complexity
plone CWE-284
5.9
2017-09-19 CVE-2015-1854 Improper Access Control vulnerability in multiple products
389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.
network
low complexity
fedoraproject debian CWE-284
7.5
2017-09-15 CVE-2015-0110 Improper Access Control vulnerability in IBM products
IBM Business Process Manager (aka BPM) 7.5.x, 8.0.x, and 8.5.x and WebSphere Lombardi Edition (aka WLE) 7.2.x allow remote authenticated users to bypass intended access restrictions on internal service types via vectors involving the executeServiceByName URL.
network
low complexity
ibm CWE-284
6.5
2017-09-06 CVE-2015-3163 Improper Access Control vulnerability in Redhat Beaker
The admin pages for power types and key types in Beaker before 20.1 do not have any access controls, which allows remote authenticated users to modify power types and key types via navigating to $BEAKER/powertypes and $BEAKER/keytypes respectively.
network
low complexity
redhat CWE-284
4.3
2017-08-31 CVE-2014-8677 Improper Access Control vulnerability in Soplanning
The installation process for SOPlanning 1.32 and earlier allows remote authenticated users with a prepared database, and access to an existing database with a crafted name, or permissions to create arbitrary databases, or if PHP before 5.2 is being used, the configuration database is down, and smarty/templates_c is not writable to execute arbitrary php code via a crafted database name.
network
high complexity
soplanning CWE-284
5.3