Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2016-05-11 CVE-2016-1041 Improper Access Control vulnerability in Adobe products
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, CVE-2016-1039, CVE-2016-1040, CVE-2016-1042, CVE-2016-1044, CVE-2016-1062, and CVE-2016-1117.
network
low complexity
adobe CWE-284
critical
10.0
2016-05-11 CVE-2016-1040 Improper Access Control vulnerability in Adobe products
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, CVE-2016-1039, CVE-2016-1041, CVE-2016-1042, CVE-2016-1044, CVE-2016-1062, and CVE-2016-1117.
network
low complexity
adobe CWE-284
critical
9.8
2016-05-11 CVE-2016-1039 Improper Access Control vulnerability in Adobe products
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1038, CVE-2016-1040, CVE-2016-1041, CVE-2016-1042, CVE-2016-1044, CVE-2016-1062, and CVE-2016-1117.
network
low complexity
adobe CWE-284
critical
9.8
2016-05-11 CVE-2016-1038 Improper Access Control vulnerability in Adobe products
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2016-1039, CVE-2016-1040, CVE-2016-1041, CVE-2016-1042, CVE-2016-1044, CVE-2016-1062, and CVE-2016-1117.
network
low complexity
adobe CWE-284
critical
10.0
2016-05-11 CVE-2016-0188 Improper Access Control vulnerability in Microsoft Internet Explorer 11
The User Mode Code Integrity (UMCI) implementation in Device Guard in Microsoft Internet Explorer 11 allows remote attackers to bypass a code-signing protection mechanism via unspecified vectors, aka "Internet Explorer Security Feature Bypass."
network
low complexity
microsoft CWE-284
8.8
2016-05-11 CVE-2016-0183 Improper Access Control vulnerability in Microsoft products
The Windows font library in Microsoft Office 2010 SP2, Word 2010 SP2, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Microsoft Office Graphics RCE Vulnerability."
network
low complexity
microsoft CWE-284
8.8
2016-05-11 CVE-2016-0182 Improper Access Control vulnerability in Microsoft products
Windows Journal in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8.1, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted Journal (aka .jnt) file, aka "Windows Journal Memory Corruption Vulnerability."
local
low complexity
microsoft CWE-284
7.8
2016-05-11 CVE-2016-0179 Improper Access Control vulnerability in Microsoft products
Windows Shell in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Shell Remote Code Execution Vulnerability."
local
low complexity
microsoft CWE-284
7.8
2016-05-11 CVE-2016-0170 Improper Access Control vulnerability in Microsoft products
GDI in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted document, aka "Windows Graphics Component RCE Vulnerability."
network
low complexity
microsoft CWE-284
8.8
2016-05-09 CVE-2016-3105 Improper Access Control vulnerability in multiple products
The convert extension in Mercurial before 3.8 might allow context-dependent attackers to execute arbitrary code via a crafted git repository name.
network
low complexity
debian mercurial CWE-284
8.8