Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2018-10-29 CVE-2018-17908 Improper Access Control vulnerability in Advantech Webaccess
WebAccess Versions 8.3.2 and prior.
local
low complexity
advantech CWE-284
7.8
2018-08-20 CVE-2016-7048 Improper Access Control vulnerability in Postgresql
The interactive installer in PostgreSQL before 9.3.15, 9.4.x before 9.4.10, and 9.5.x before 9.5.5 might allow remote attackers to execute arbitrary code by leveraging use of HTTP to download software.
network
high complexity
postgresql CWE-284
8.1
2018-07-27 CVE-2017-7497 Improper Access Control vulnerability in Redhat Cloudforms Management Engine 5.7.2/5.8.0
The dialog for creating cloud volumes (cinder provider) in CloudForms does not filter cloud tenants by user.
network
low complexity
redhat CWE-284
4.3
2018-07-26 CVE-2017-12171 Improper Access Control vulnerability in multiple products
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly.
network
low complexity
redhat apache CWE-284
6.5
2018-07-13 CVE-2016-6543 Improper Access Control vulnerability in Ieasytec Itrack Easy
A captured MAC/device ID of an iTrack Easy can be registered under multiple user accounts allowing access to getgps GPS data, which can allow unauthenticated parties to track the device.
network
high complexity
ieasytec CWE-284
5.9
2018-07-11 CVE-2013-2972 Improper Access Control vulnerability in IBM Websphere Cast Iron Cloud Integration 6.0.0.0/6.1.0.0/6.3.0.0
IBM WebSphere Cast Iron 6.3 allows remote attackers to bypass intended access restrictions via unspecified vectors.
network
low complexity
ibm CWE-284
7.5
2018-06-11 CVE-2016-9905 Improper Access Control vulnerability in multiple products
A potentially exploitable crash in "EnumerateSubDocuments" while adding or removing sub-documents.
network
low complexity
redhat debian mozilla CWE-284
8.8
2018-05-11 CVE-2009-5151 Improper Access Control vulnerability in Absolute Computrace Agent 70.785
The stub component of Absolute Computrace Agent V70.785 executes code from a disk's inter-partition space without requiring a digital signature for that code, which allows attackers to execute code on the BIOS.
local
low complexity
absolute CWE-284
6.7
2018-05-11 CVE-2009-5150 Improper Access Control vulnerability in Absolute Computrace Agent 80.845/80.866
Absolute Computrace Agent V80.845 and V80.866 does not have a digital signature for the configuration block, which allows attackers to set up communication with a web site other than the intended search.namequery.com site by modifying data within a disk's inter-partition space.
local
low complexity
absolute CWE-284
6.7
2018-05-02 CVE-2013-6272 Improper Access Control vulnerability in Google Android
The NotificationBroadcastReceiver class in the com.android.phone process in Google Android 4.1.1 through 4.4.2 allows attackers to bypass intended access restrictions and consequently make phone calls to arbitrary numbers, send mmi or ussd codes, or hangup ongoing calls via a crafted application.
local
low complexity
google CWE-284
7.8