Vulnerabilities > Permissions, Privileges, and Access Controls
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-03-02 | CVE-2015-7962 | Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service for Outlook web APP Agent SafeNet Authentication Service for Outlook Web App Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module. | 7.8 |
2018-03-02 | CVE-2015-7961 | Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service Remote web Workplace Agent SafeNet Authentication Service Remote Web Workplace Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module. | 7.8 |
2018-03-02 | CVE-2015-7598 | Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service Tokenvalidator Proxy Agent SafeNet Authentication Service TokenValidator Proxy Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module. | 7.8 |
2018-03-02 | CVE-2015-7597 | Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service IIS Agent SafeNet Authentication Service IIS Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module. | 7.8 |
2018-03-02 | CVE-2015-7596 | Permissions, Privileges, and Access Controls vulnerability in Gemalto Safenet Authentication Service END User Software Tools for Windows SafeNet Authentication Service End User Software Tools for Windows uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module. | 7.8 |
2018-02-27 | CVE-2014-10070 | Permissions, Privileges, and Access Controls vulnerability in ZSH Project ZSH zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). | 7.8 |
2018-02-15 | CVE-2016-8534 | Permissions, Privileges, and Access Controls vulnerability in HP Matrix Operating Environment 7.6 A remote privilege elevation vulnerability in HPE Matrix Operating Environment version 7.6 was found. | 8.8 |
2018-02-15 | CVE-2016-8533 | Permissions, Privileges, and Access Controls vulnerability in HP Matrix Operating Environment 7.6 A remote priviledge escalation vulnerability in HPE Matrix Operating Environment version 7.6 was found. | 8.8 |
2018-02-15 | CVE-2016-8528 | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus A Remote Escalation of Privilege vulnerability in HPE Helion Eucalyptus version 3.3.0 through 4.3.1 was found. | 8.8 |
2018-02-12 | CVE-2016-8742 | Permissions, Privileges, and Access Controls vulnerability in Apache Couchdb 2.0.0 The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation. | 7.8 |