Vulnerabilities > Permissions, Privileges, and Access Controls

DATE CVE VULNERABILITY TITLE RISK
2016-04-11 CVE-2016-0735 Permissions, Privileges, and Access Controls vulnerability in Apache Ranger 0.5.0/0.5.1
Apache Ranger 0.5.x before 0.5.2 allows remote authenticated users to bypass intended parent resource-level access restrictions by leveraging mishandling of a resource-level exclude policy.
network
low complexity
apache CWE-264
8.8
2016-04-11 CVE-2015-0266 Permissions, Privileges, and Access Controls vulnerability in Apache Ranger 0.4.0
The Policy Admin Tool in Apache Ranger before 0.5.0 allows remote authenticated users to bypass intended access restrictions via direct access to module URLs.
network
low complexity
apache CWE-264
7.1
2016-04-11 CVE-2016-3065 Permissions, Privileges, and Access Controls vulnerability in Postgresql 9.5/9.5.1
The (1) brin_page_type and (2) brin_metapage_info functions in the pageinspect extension in PostgreSQL before 9.5.x before 9.5.2 allows attackers to bypass intended access restrictions and consequently obtain sensitive server memory information or cause a denial of service (server crash) via a crafted bytea value in a BRIN index page.
network
low complexity
postgresql CWE-264
critical
9.1
2016-04-11 CVE-2016-1235 Permissions, Privileges, and Access Controls vulnerability in multiple products
The oarsh script in OAR before 2.5.7 allows remote authenticated users of a cluster to obtain sensitive information and possibly gain privileges via vectors related to OpenSSH options.
network
low complexity
oar-project debian CWE-264
8.8
2016-04-11 CVE-2016-2393 Permissions, Privileges, and Access Controls vulnerability in Lenovo Fingerprint Manager and Touch Fingerprint
Lenovo Fingerprint Manager before 8.01.57 and Touch Fingerprint before 1.00.08 use weak ACLs for unspecified (1) services and (2) files, which allows local users to gain privileges by invalidating local checks.
local
low complexity
lenovo CWE-264
7.8
2016-04-11 CVE-2016-2171 Permissions, Privileges, and Access Controls vulnerability in Apache Jetspeed
The User Manager service in Apache Jetspeed before 2.3.1 does not properly restrict access using Jetspeed Security, which allows remote attackers to (1) add, (2) edit, or (3) delete users via the REST API.
network
low complexity
apache CWE-264
7.5
2016-04-08 CVE-2016-3188 Permissions, Privileges, and Access Controls vulnerability in Prepopulate Project Prepopulate 7.X2.0/7.X2.X
The _prepopulate_request_walk function in the Prepopulate module 7.x-2.x before 7.x-2.1 for Drupal allows remote attackers to modify the (1) actions, (2) container, (3) token, (4) password, (5) password_confirm, (6) text_format, or (7) markup field type, and consequently have unspecified impact, via unspecified vectors.
network
low complexity
prepopulate-project CWE-264
7.3
2016-04-08 CVE-2016-3187 Permissions, Privileges, and Access Controls vulnerability in Prepopulate Project Prepopulate 7.X2.0/7.X2.X
The Prepopulate module 7.x-2.x before 7.x-2.1 for Drupal allows remote attackers to modify the REQUEST superglobal array, and consequently have unspecified impact, via a base64-encoded pp parameter.
network
low complexity
prepopulate-project CWE-264
7.3
2016-04-07 CVE-2016-1531 Permissions, Privileges, and Access Controls vulnerability in Exim
Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
local
high complexity
exim CWE-264
7.0
2016-04-07 CVE-2016-0788 Permissions, Privileges, and Access Controls vulnerability in multiple products
The remoting module in Jenkins before 1.650 and LTS before 1.642.2 allows remote attackers to execute arbitrary code by opening a JRMP listener.
network
low complexity
jenkins redhat CWE-264
critical
9.8