Vulnerabilities > Permissions, Privileges, and Access Controls

DATE CVE VULNERABILITY TITLE RISK
2018-03-02 CVE-2015-7962 Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service for Outlook web APP Agent
SafeNet Authentication Service for Outlook Web App Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
local
low complexity
gemalto CWE-264
7.8
2018-03-02 CVE-2015-7961 Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service Remote web Workplace Agent
SafeNet Authentication Service Remote Web Workplace Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
local
low complexity
gemalto CWE-264
7.8
2018-03-02 CVE-2015-7598 Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service Tokenvalidator Proxy Agent
SafeNet Authentication Service TokenValidator Proxy Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
local
low complexity
gemalto CWE-264
7.8
2018-03-02 CVE-2015-7597 Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service IIS Agent
SafeNet Authentication Service IIS Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
local
low complexity
gemalto CWE-264
7.8
2018-03-02 CVE-2015-7596 Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service END User Software Tools for Windows
SafeNet Authentication Service End User Software Tools for Windows uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
local
low complexity
gemalto CWE-264
7.8
2018-02-27 CVE-2014-10070 Permissions, Privileges, and Access Controls vulnerability in ZSH Project ZSH
zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers).
local
low complexity
zsh-project CWE-264
7.8
2018-02-15 CVE-2016-8534 Permissions, Privileges, and Access Controls vulnerability in HP Matrix Operating Environment 7.6
A remote privilege elevation vulnerability in HPE Matrix Operating Environment version 7.6 was found.
network
low complexity
hp CWE-264
8.8
2018-02-15 CVE-2016-8533 Permissions, Privileges, and Access Controls vulnerability in HP Matrix Operating Environment 7.6
A remote priviledge escalation vulnerability in HPE Matrix Operating Environment version 7.6 was found.
network
low complexity
hp CWE-264
8.8
2018-02-15 CVE-2016-8528 Permissions, Privileges, and Access Controls vulnerability in Eucalyptus
A Remote Escalation of Privilege vulnerability in HPE Helion Eucalyptus version 3.3.0 through 4.3.1 was found.
network
low complexity
eucalyptus CWE-264
8.8
2018-02-12 CVE-2016-8742 Permissions, Privileges, and Access Controls vulnerability in Apache Couchdb 2.0.0
The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation.
local
low complexity
apache CWE-264
7.8