Vulnerabilities > Incorrect Permission Assignment for Critical Resource

DATE CVE VULNERABILITY TITLE RISK
2017-11-03 CVE-2017-1000134 Incorrect Permission Assignment for Critical Resource vulnerability in Mahara
Mahara 1.8 before 1.8.6 and 1.9 before 1.9.4 and 1.10 before 1.10.1 and 15.04 before 15.04.0 are vulnerable because group members can lose access to the group files they uploaded if another group member changes the access permissions on them.
network
low complexity
mahara CWE-732
8.1
2017-10-27 CVE-2017-15945 Incorrect Permission Assignment for Critical Resource vulnerability in multiple products
The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link.
local
low complexity
mariadb mysql CWE-732
7.8
2017-10-27 CVE-2017-5118 Incorrect Permission Assignment for Critical Resource vulnerability in multiple products
Blink in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, failed to correctly propagate CSP restrictions to javascript scheme pages, which allowed a remote attacker to bypass content security policy via a crafted HTML page.
network
low complexity
google debian redhat CWE-732
4.3
2017-10-26 CVE-2017-15906 Incorrect Permission Assignment for Critical Resource vulnerability in multiple products
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
network
low complexity
openbsd oracle debian netapp redhat CWE-732
5.3
2017-10-23 CVE-2017-7146 Incorrect Permission Assignment for Critical Resource vulnerability in Apple Iphone OS
An issue was discovered in certain Apple products.
network
low complexity
apple CWE-732
5.3
2017-10-19 CVE-2017-15611 Incorrect Permission Assignment for Critical Resource vulnerability in Octopus Deploy
In Octopus before 3.17.7, an authenticated user who was explicitly granted the permission to invite new users (aka UserInvite) can invite users to teams with escalated privileges.
network
low complexity
octopus CWE-732
6.5
2017-10-12 CVE-2017-9514 Incorrect Permission Assignment for Critical Resource vulnerability in Atlassian Bamboo
Bamboo before 6.0.5, 6.1.x before 6.1.4, and 6.2.x before 6.2.1 had a REST endpoint that parsed a YAML file and did not sufficiently restrict which classes could be loaded.
network
low complexity
atlassian CWE-732
8.8
2017-10-05 CVE-2017-1000096 Incorrect Permission Assignment for Critical Resource vulnerability in Jenkins Pipeline: Groovy
Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code.
network
low complexity
jenkins CWE-732
8.8
2017-10-05 CVE-2017-1000095 Incorrect Permission Assignment for Critical Resource vulnerability in Jenkins Script Security 1.34
The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String).
network
low complexity
jenkins CWE-732
6.5
2017-10-04 CVE-2017-9792 Incorrect Permission Assignment for Critical Resource vulnerability in Apache Impala 2.8.0/2.9.0
In Apache Impala (incubating) before 2.10.0, a malicious user with "ALTER" permissions on an Impala table can access any other Kudu table data by altering the table properties to make it "external" and then changing the underlying table mapping to point to other Kudu tables.
network
low complexity
apache CWE-732
6.5