Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2017-03-14 CVE-2014-9920 Improper Access Control vulnerability in Mcafee Application Control
Unauthorized execution of binary vulnerability in McAfee (now Intel Security) McAfee Application Control (MAC) 6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and earlier allows attackers to create a malformed Windows binary that is considered non-executable and is not protected through the whitelisting protection feature via a specific set of circumstances.
network
high complexity
mcafee CWE-284
5.9
2017-03-14 CVE-2013-7461 Improper Access Control vulnerability in Mcafee Application Control and Change Control
A write protection and execution bypass vulnerability in McAfee (now Intel Security) Change Control (MCC) 6.1.0 for Linux and earlier allows authenticated users to change files that are part of write protection rules via specific conditions.
local
low complexity
mcafee CWE-284
5.5
2017-03-14 CVE-2013-7460 Improper Access Control vulnerability in Mcafee Application Control and Change Control
A write protection and execution bypass vulnerability in McAfee (now Intel Security) Application Control (MAC) 6.1.0 for Linux and earlier allows authenticated users to change binaries that are part of the Application Control whitelist and allows execution of binaries via specific conditions.
local
low complexity
mcafee CWE-284
5.5
2017-03-14 CVE-2016-9368 Improper Access Control vulnerability in Eaton Xcomfort Ethernet Communication Interface 1.07
An issue was discovered in Eaton xComfort Ethernet Communication Interface (ECI) Versions 1.07 and prior.
network
low complexity
eaton CWE-284
7.5
2017-03-07 CVE-2016-9245 Improper Access Control vulnerability in F5 products
In F5 BIG-IP systems 12.1.0 - 12.1.2, malicious requests made to virtual servers with an HTTP profile can cause the TMM to restart.
network
high complexity
f5 CWE-284
5.9
2017-03-07 CVE-2016-6255 Improper Access Control vulnerability in multiple products
Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler.
network
low complexity
debian libupnp-project CWE-284
7.5
2017-03-03 CVE-2016-8236 Improper Access Control vulnerability in Lenovo Thinkserver Firmware 3.76.208
Reset to default settings may occur in Lenovo ThinkServer TSM RD350, RD450, RD550, RD650, TD350 during a prolonged broadcast storm in TSM versions earlier than 3.77.
network
low complexity
lenovo CWE-284
7.5
2017-03-03 CVE-2016-10065 Improper Access Control vulnerability in multiple products
The ReadVIFFImage function in coders/viff.c in ImageMagick before 7.0.1-0 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
local
low complexity
imagemagick opensuse CWE-284
7.8
2017-03-03 CVE-2016-7408 Improper Access Control vulnerability in Dropbear SSH Project Dropbear SSH
The dbclient in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via a crafted (1) -m or (2) -c argument.
network
low complexity
dropbear-ssh-project CWE-284
8.8
2017-03-03 CVE-2016-10193 Improper Access Control vulnerability in Espeak-Ruby Project Espeak-Ruby
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
network
low complexity
espeak-ruby-project CWE-284
critical
9.8