Vulnerabilities > Permissions, Privileges, and Access Controls

DATE CVE VULNERABILITY TITLE RISK
2016-04-18 CVE-2016-0850 Permissions, Privileges, and Access Controls vulnerability in Google Android
The PORCHE_PAIRING_CONFLICT feature in Bluetooth in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 allows remote attackers to bypass intended pairing restrictions via a crafted device, aka internal bug 26551752.
low complexity
google CWE-264
8.8
2016-04-18 CVE-2016-0847 Permissions, Privileges, and Access Controls vulnerability in Google Android
The Telecom Component in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 allows attackers to spoof the originating telephone number of a call via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26864502.
local
low complexity
google CWE-264
8.4
2016-04-18 CVE-2016-0846 Permissions, Privileges, and Access Controls vulnerability in Google Android
libs/binder/IMemory.cpp in the IMemory Native Interface in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 does not properly consider the heap size, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26877992.
local
low complexity
google CWE-264
8.4
2016-04-18 CVE-2016-0844 Permissions, Privileges, and Access Controls vulnerability in Google Android 6.0/6.0.1
The Qualcomm RF driver in Android 6.x before 2016-04-01 does not properly restrict access to socket ioctl calls, which allows attackers to gain privileges via a crafted application, aka internal bug 26324307.
local
low complexity
google CWE-264
8.4
2016-04-18 CVE-2016-0843 Permissions, Privileges, and Access Controls vulnerability in Google Android
The Qualcomm ARM processor performance-event manager in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 allows attackers to gain privileges via a crafted application, aka internal bug 25801197.
local
low complexity
google CWE-264
8.4
2016-04-15 CVE-2016-1264 Permissions, Privileges, and Access Controls vulnerability in Juniper Junos
Race condition in the Op command in Juniper Junos OS before 12.1X44-D55, 12.1X46 before 12.1X46-D40, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R11, 12.3X48 before 12.3X48-D20, 12.3X50 before 12.3X50-D50, 13.2 before 13.2R8, 13.2X51 before 13.2X51-D39, 13.2X52 before 13.2X52-D30, 13.3 before 13.3R7, 14.1 before 14.1R6, 14.1X53 before 14.1X53-D30, 14.2 before 14.2R4, 15.1 before 15.1F2 or 15.1R2, 15.1X49 before 15.1X49-D10 or 15.1X49-D20, and 16.1 before 16.1R1 allows remote authenticated users to gain privileges via the URL option.
network
low complexity
juniper CWE-264
8.8
2016-04-13 CVE-2016-2313 Permissions, Privileges, and Access Controls vulnerability in multiple products
auth_login.php in Cacti before 0.8.8g allows remote authenticated users who use web authentication to bypass intended access restrictions by logging in as a user not in the cacti database.
network
low complexity
cacti opensuse CWE-264
8.8
2016-04-13 CVE-2016-2057 Permissions, Privileges, and Access Controls vulnerability in multiple products
lib/xymond_ipc.c in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 use weak permissions (666) for an unspecified IPC message queue, which allows local users to inject arbitrary messages by writing to that queue.
local
low complexity
xymon debian CWE-264
3.3
2016-04-13 CVE-2015-0861 Permissions, Privileges, and Access Controls vulnerability in multiple products
model/modelstorage.py in trytond 3.2.x before 3.2.10, 3.4.x before 3.4.8, 3.6.x before 3.6.5, and 3.8.x before 3.8.1 allows remote authenticated users to bypass intended access restrictions and write to arbitrary fields via a sequence of records.
network
low complexity
tryton debian CWE-264
4.3
2016-04-13 CVE-2014-6276 Permissions, Privileges, and Access Controls vulnerability in multiple products
schema.py in Roundup before 1.5.1 does not properly limit attributes included in default user permissions, which might allow remote authenticated users to obtain sensitive user information by viewing user details.
network
low complexity
roundup-tracker debian CWE-264
4.3