Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2016-03-24 CVE-2016-1770 Improper Access Control vulnerability in Apple mac OS X
The Reminders component in Apple OS X before 10.11.4 allows attackers to bypass an intended user-confirmation requirement and trigger a dialing action via a tel: URL.
network
low complexity
apple CWE-284
6.5
2016-03-14 CVE-2016-0222 Improper Access Control vulnerability in IBM products
IBM Maximo Asset Management 7.6 before 7.6.0.3 IFIX001 allows remote authenticated users to bypass intended access restrictions and read arbitrary purchase-order work logs via unspecified vectors.
network
low complexity
ibm CWE-284
4.3
2016-03-14 CVE-2016-0208 Improper Access Control vulnerability in IBM Websphere Commerce
IBM WebSphere Commerce 6.x through 6.0.0.11, 7.x through 7.0.0.9, and 8.x before 8.0.0.3 allows remote attackers to cause a denial of service (order-processing outage) via unspecified vectors.
network
high complexity
ibm CWE-284
3.7
2016-03-13 CVE-2015-7560 Improper Access Control vulnerability in multiple products
The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
network
low complexity
samba canonical debian CWE-284
6.5
2016-03-06 CVE-2016-1638 Improper Access Control vulnerability in Google Chrome
extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app.
network
low complexity
google CWE-284
6.3
2016-03-04 CVE-2016-2243 Improper Access Control vulnerability in HP products
Sure Start on HP Commercial PCs 2015 allows local users to cause a denial of service (BIOS recovery failure) by leveraging administrative access.
local
low complexity
hp CWE-284
7.9
2016-03-03 CVE-2015-7490 Improper Access Control vulnerability in IBM Infosphere Information Server
IBM InfoSphere Information Server 8.5 through FP3, 8.7 through FP2, 9.1 through 9.1.2.0, 11.3 through 11.3.1.2, and 11.5 allows remote authenticated users to bypass intended access restrictions via a modified cookie.
network
high complexity
ibm CWE-284
3.1
2016-03-02 CVE-2016-2278 Improper Access Control vulnerability in Schneider-Electric products
Schneider Electric Struxureware Building Operations Automation Server AS 1.7 and earlier and AS-P 1.7 and earlier allows remote authenticated administrators to execute arbitrary OS commands by defeating an msh (aka Minimal Shell) protection mechanism.
network
low complexity
schneider-electric CWE-284
7.2
2016-02-29 CVE-2016-0225 Improper Access Control vulnerability in IBM Websphere Commerce
IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x through 7.0.0.9 allows remote authenticated Commerce Accelerator administrators to obtain sensitive information via unspecified vectors.
network
low complexity
ibm CWE-284
4.9
2016-02-21 CVE-2016-2275 Improper Access Control vulnerability in Advantech Vesp211-232 Firmware and Vesp211-Eu Firmware
The web interface on Advantech/B+B SmartWorx VESP211-EU devices with firmware 1.7.2 and VESP211-232 devices with firmware 1.5.1 and 1.7.2 relies on the client to implement access control, which allows remote attackers to perform administrative actions via modified JavaScript code.
network
low complexity
advantech CWE-284
critical
9.8