Vulnerabilities > Improper Access Control

DATE CVE VULNERABILITY TITLE RISK
2016-05-09 CVE-2015-5207 Improper Access Control vulnerability in Apache Cordova
Apache Cordova iOS before 4.0.0 might allow attackers to bypass a URL whitelist protection mechanism in an app and load arbitrary resources by leveraging unspecified methods.
local
low complexity
apache CWE-284
5.3
2016-05-07 CVE-2015-6552 Improper Access Control vulnerability in Veritas Netbackup and Netbackup Appliance
The management-services protocol implementation in Veritas NetBackup 7.x through 7.5.0.7, 7.6.0.x through 7.6.0.4, 7.6.1.x through 7.6.1.2, and 7.7.x before 7.7.2 and NetBackup Appliance through 2.5.4, 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, and 2.7.x before 2.7.2 allows remote attackers to make arbitrary RPC calls via unspecified vectors.
network
low complexity
veritas CWE-284
critical
9.8
2016-05-07 CVE-2015-6550 Improper Access Control vulnerability in Veritas Netbackup and Netbackup Appliance
bpcd in Veritas NetBackup 7.x through 7.5.0.7, 7.6.0.x through 7.6.0.4, 7.6.1.x through 7.6.1.2, and 7.7.x before 7.7.2 and NetBackup Appliance through 2.5.4, 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary commands via crafted input.
network
low complexity
veritas CWE-284
critical
9.8
2016-05-07 CVE-2016-2014 Improper Access Control vulnerability in HP Network Node Manager I
HPE Network Node Manager i (NNMi) 9.20, 9.23, 9.24, 9.25, 10.00, and 10.01 allows remote authenticated users to modify data or cause a denial of service via unspecified vectors.
network
low complexity
hp CWE-284
8.1
2016-05-07 CVE-2016-2009 Improper Access Control vulnerability in HP Network Node Manager I
HPE Network Node Manager i (NNMi) 9.20, 9.23, 9.24, 9.25, 10.00, and 10.01 allows remote authenticated users to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
network
low complexity
hp CWE-284
8.8
2016-05-05 CVE-2016-2167 Improper Access Control vulnerability in Apache Subversion
The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
network
high complexity
apache CWE-284
6.8
2016-05-02 CVE-2014-9717 Improper Access Control vulnerability in Linux Kernel
fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.
local
low complexity
linux CWE-284
6.1
2016-05-02 CVE-2012-6689 Improper Access Control vulnerability in Linux Kernel
The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.
local
low complexity
linux CWE-284
7.8
2016-04-30 CVE-2016-2820 Improper Access Control vulnerability in Mozilla Firefox
The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Firefox before 46.0 does not properly restrict the origin of events, which makes it easier for remote attackers to modify sharing preferences by leveraging access to the remote-report IFRAME element.
network
low complexity
mozilla CWE-284
4.3
2016-04-30 CVE-2016-2816 Improper Access Control vulnerability in Mozilla Firefox
Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.
network
low complexity
mozilla CWE-284
6.5