Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2016-06-29 CVE-2016-5101 Improper Access Control vulnerability in Opera Mail
Unspecified vulnerability in Opera Mail before 2016-02-16 on Windows allows user-assisted remote attackers to execute arbitrary code via a crafted e-mail message.
network
low complexity
opera CWE-284
8.8
2016-06-29 CVE-2016-1237 Improper Access Control vulnerability in Linux Kernel
nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.
local
low complexity
linux CWE-284
5.5
2016-06-29 CVE-2016-0304 Improper Access Control vulnerability in IBM Domino
The Java Console in IBM Domino 8.5.x before 8.5.3 FP6 IF13 and 9.x before 9.0.1 FP6, when a certain unsupported configuration involving UNC share pathnames is used, allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, aka SPR KLYHA7MM3J.
network
high complexity
ibm CWE-284
8.1
2016-06-27 CVE-2016-3713 Improper Access Control vulnerability in Linux Kernel
The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.
local
low complexity
linux CWE-284
7.1
2016-06-27 CVE-2016-3707 Improper Access Control vulnerability in multiple products
The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.
network
high complexity
linux redhat novell CWE-284
8.1
2016-06-26 CVE-2016-0279 Improper Access Control vulnerability in IBM Domino
Heap-based buffer overflow in the KeyView PDF filter in IBM Domino 8.5.x before 8.5.3 FP6 IF13 and 9.x before 9.0.1 FP6 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2016-0277, CVE-2016-0278, and CVE-2016-0301.
local
low complexity
ibm CWE-284
7.8
2016-06-26 CVE-2016-0278 Improper Access Control vulnerability in IBM Domino
Heap-based buffer overflow in the KeyView PDF filter in IBM Domino 8.5.x before 8.5.3 FP6 IF13 and 9.x before 9.0.1 FP6 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2016-0277, CVE-2016-0279, and CVE-2016-0301.
local
low complexity
ibm CWE-284
7.8
2016-06-26 CVE-2016-0277 Improper Access Control vulnerability in IBM Domino
Heap-based buffer overflow in the KeyView PDF filter in IBM Domino 8.5.x before 8.5.3 FP6 IF13 and 9.x before 9.0.1 FP6 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2016-0278, CVE-2016-0279, and CVE-2016-0301.
local
low complexity
ibm CWE-284
7.8
2016-06-26 CVE-2015-7473 Improper Access Control vulnerability in IBM Websphere MQ
runmqsc in IBM WebSphere MQ 8.x before 8.0.0.5 allows local users to bypass intended queue-manager command access restrictions by leveraging authority for +connect and +dsp.
local
high complexity
ibm CWE-284
2.5
2016-06-25 CVE-2016-1190 Improper Access Control vulnerability in Cybozu Garoon
Cybozu Garoon 3.1 through 4.2 allows remote authenticated users to bypass intended restrictions on MultiReport reading via unspecified vectors.
network
low complexity
cybozu CWE-284
6.5