Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2016-07-06 CVE-2016-0906 Improper Access Control vulnerability in EMC Avamar
The web-restore interface in Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar through 7.1.2 and 7.2.x through 7.2.1 allows remote authenticated users to read or delete directories via a Linux backup-restore operation.
network
low complexity
emc CWE-284
8.8
2016-07-02 CVE-2016-0391 Improper Access Control vulnerability in IBM Watson Developer Cloud
The IBM Watson Developer Cloud services on Bluemix platforms do not properly generate random numbers for service-instance credentials, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
network
low complexity
ibm CWE-284
critical
9.8
2016-06-30 CVE-2015-8801 Improper Access Control vulnerability in Symantec Endpoint Protection Manager 12.1.6
Race condition in the client in Symantec Endpoint Protection (SEP) 12.1 before RU6 MP5 allows local users to bypass intended restrictions on USB file transfer by conducting filesystem operations before the SEP device manager recognizes a new USB device.
high complexity
symantec CWE-284
2.9
2016-06-30 CVE-2016-0349 Improper Access Control vulnerability in IBM Business Process Manager 8.5.6.0/8.5.7.0
IBM Business Process Manager 8.5.6 through 8.5.6.2 and 8.5.7 before 8.5.7.CF201606 allows remote authenticated users to bypass intended access restrictions and update process-instance variables via a REST API call.
network
low complexity
ibm CWE-284
6.5
2016-06-29 CVE-2016-5101 Improper Access Control vulnerability in Opera Mail
Unspecified vulnerability in Opera Mail before 2016-02-16 on Windows allows user-assisted remote attackers to execute arbitrary code via a crafted e-mail message.
network
low complexity
opera CWE-284
8.8
2016-06-29 CVE-2016-1237 Improper Access Control vulnerability in Linux Kernel
nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.
local
low complexity
linux CWE-284
5.5
2016-06-29 CVE-2016-0304 Improper Access Control vulnerability in IBM Domino
The Java Console in IBM Domino 8.5.x before 8.5.3 FP6 IF13 and 9.x before 9.0.1 FP6, when a certain unsupported configuration involving UNC share pathnames is used, allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, aka SPR KLYHA7MM3J.
network
high complexity
ibm CWE-284
8.1
2016-06-27 CVE-2016-3713 Improper Access Control vulnerability in Linux Kernel
The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.
local
low complexity
linux CWE-284
7.1
2016-06-27 CVE-2016-3707 Improper Access Control vulnerability in multiple products
The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.
network
high complexity
linux redhat novell CWE-284
8.1
2016-06-26 CVE-2016-0279 Improper Access Control vulnerability in IBM Domino
Heap-based buffer overflow in the KeyView PDF filter in IBM Domino 8.5.x before 8.5.3 FP6 IF13 and 9.x before 9.0.1 FP6 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2016-0277, CVE-2016-0278, and CVE-2016-0301.
local
low complexity
ibm CWE-284
7.8