Vulnerabilities > Permissions, Privileges, and Access Controls
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-03-02 | CVE-2015-7598 | Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service Tokenvalidator Proxy Agent SafeNet Authentication Service TokenValidator Proxy Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module. | 7.8 |
2018-03-02 | CVE-2015-7597 | Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service IIS Agent SafeNet Authentication Service IIS Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module. | 7.8 |
2018-03-02 | CVE-2015-7596 | Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service END User Software Tools for Windows SafeNet Authentication Service End User Software Tools for Windows uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module. | 7.8 |
2018-02-27 | CVE-2014-10070 | Permissions, Privileges, and Access Controls vulnerability in ZSH Project ZSH zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). | 7.8 |
2018-02-15 | CVE-2016-8534 | Permissions, Privileges, and Access Controls vulnerability in HP Matrix Operating Environment 7.6 A remote privilege elevation vulnerability in HPE Matrix Operating Environment version 7.6 was found. | 8.8 |
2018-02-15 | CVE-2016-8533 | Permissions, Privileges, and Access Controls vulnerability in HP Matrix Operating Environment 7.6 A remote priviledge escalation vulnerability in HPE Matrix Operating Environment version 7.6 was found. | 8.8 |
2018-02-15 | CVE-2016-8528 | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus A Remote Escalation of Privilege vulnerability in HPE Helion Eucalyptus version 3.3.0 through 4.3.1 was found. | 8.8 |
2018-02-12 | CVE-2016-8742 | Permissions, Privileges, and Access Controls vulnerability in Apache Couchdb 2.0.0 The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation. | 7.8 |
2018-02-05 | CVE-2015-1416 | Permissions, Privileges, and Access Controls vulnerability in Freebsd 10.0/10.1/10.2 Larry Wall's patch; patch in FreeBSD 10.2-RC1 before 10.2-RC1-p1, 10.2 before 10.2-BETA2-p2, and 10.1 before 10.1-RELEASE-p16; Bitrig; GNU patch before 2.2.5; and possibly other patch variants allow remote attackers to execute arbitrary shell commands via a crafted patch file. | 7.8 |
2018-02-01 | CVE-2014-9503 | Permissions, Privileges, and Access Controls vulnerability in Open Atrium Project Open Atrium The Discussions sub module in the Open Atrium module 7.x-2.x before 7.x-2.26 for Drupal allows remote authenticated users with "access content" permissions to modify arbitrary nodes by leveraging improper access checks on unspecified ajax callbacks. | 6.5 |