Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2016-06-10 CVE-2016-2785 Improper Access Control vulnerability in Puppet Puppet, Puppet Agent and Puppet Server
Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.
network
low complexity
puppet CWE-284
critical
9.8
2016-06-10 CVE-2016-4524 Improper Access Control vulnerability in ABB Pcm600 2.6
ABB PCM600 before 2.7 improperly stores OPC Server IEC61850 passwords in unspecified temporary circumstances, which allows local users to obtain sensitive information via unknown vectors.
local
low complexity
abb CWE-284
6.5
2016-06-10 CVE-2016-4495 Improper Access Control vulnerability in KMC Controls Bac-5051E Firmware
KMC Controls BAC-5051E devices with firmware before E0.2.0.2 allow remote attackers to bypass intended access restrictions and read a configuration file via unspecified vectors.
network
low complexity
kmc-controls CWE-284
5.3
2016-06-09 CVE-2016-2150 Improper Access Control vulnerability in multiple products
SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
local
low complexity
redhat opensuse debian spice-project CWE-284
7.1
2016-06-09 CVE-2016-1581 Improper Access Control vulnerability in Canonical LXD and Ubuntu Linux
LXD before 2.0.2 uses world-readable permissions for /var/lib/lxd/zfs.img when setting up a loop based ZFS pool, which allows local users to copy and read data from arbitrary containers via unspecified vectors.
local
low complexity
canonical CWE-284
5.5
2016-06-08 CVE-2016-3708 Improper Access Control vulnerability in Redhat Openshift 3.2
Red Hat OpenShift Enterprise 3.2, when multi-tenant SDN is enabled and a build is run in a namespace that would normally be isolated from pods in other namespaces, allows remote authenticated users to access network resources on restricted pods via an s2i build with a builder image that (1) contains ONBUILD commands or (2) does not contain a tar binary.
network
low complexity
redhat CWE-284
7.1
2016-06-08 CVE-2016-3703 Improper Access Control vulnerability in Redhat Openshift 3.1/3.2
Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.
network
high complexity
redhat CWE-284
5.3
2016-06-08 CVE-2016-4369 Improper Access Control vulnerability in HP Discovery and Dependency Mapping Inventory 9.30/9.31/9.32
HPE Discovery and Dependency Mapping Inventory (DDMi) 9.30, 9.31, 9.32, 9.32 update 1, 9.32 update 2, and 9.32 update 3 allows remote authenticated users to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library.
network
low complexity
hp CWE-284
8.8
2016-06-07 CVE-2016-4963 Improper Access Control vulnerability in XEN
The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.
local
high complexity
xen CWE-284
4.7
2016-06-07 CVE-2014-8177 Improper Access Control vulnerability in Redhat products
The Red Hat gluster-swift package, as used in Red Hat Gluster Storage (formerly Red Hat Storage Server), allows remote authenticated users to bypass the max_meta_count constraint via multiple crafted requests which exceed the limit when combined.
network
low complexity
redhat CWE-284
6.5