Vulnerabilities (CVE)

Filtered by CWE-264
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-2501 1 Google 1 Android 2016-07-11 9.3 HIGH 7.8 HIGH
The Qualcomm camera driver in Android before 2016-07-05 on Nexus 5X, 6, 6P, and 7 (2013) devices allows attackers to gain privileges via a crafted application, aka Android internal bug 27890772 and Qualcomm internal bug CR1001092.
CVE-2016-2503 1 Google 1 Android 2016-07-11 9.3 HIGH 7.8 HIGH
The Qualcomm GPU driver in Android before 2016-07-05 on Nexus 5X and 6P devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28084795 and Qualcomm internal bug CR1006067.
CVE-2016-3748 1 Google 1 Android 2016-07-11 7.5 HIGH 8.4 HIGH
The sockets subsystem in Android 6.x before 2016-07-01 allows attackers to bypass intended system-call restrictions via a crafted application that makes an ioctl call, aka internal bug 28171804.
CVE-2016-0271 1 Ibm 1 Urbancode Deploy 2016-07-08 7.2 HIGH 8.2 HIGH
The agents in IBM UrbanCode Deploy 6.x before 6.0.1.14, 6.1.x before 6.1.3.3, and 6.2.x before 6.2.1.1 do not verify a server's identity in a JMS session or an HTTP session, which allows local users to obtain root access to arbitrary agents via unspecified vectors.
CVE-2016-0375 1 Ibm 1 Messagesight 2016-07-08 9.0 HIGH 8.8 HIGH
JMS Client in IBM MessageSight 1.1.x through 1.1.0.1, 1.2.x through 1.2.0.3, and 2.0.x through 2.0.0.0 allows remote authenticated users to obtain administrator privileges for executing arbitrary commands via unspecified vectors.
CVE-2016-5248 1 Lenovo 1 Solution Center 2016-07-08 2.1 LOW 5.5 MEDIUM
The StopProxy command in LSC.Services.SystemService in Lenovo Solution Center before 3.3.003 allows local users to terminate arbitrary processes via the PID argument.
CVE-2016-2968 1 Ibm 1 Security Qradar Incident Forensics 2016-07-06 5.5 MEDIUM 6.5 MEDIUM
IBM Security QRadar Incident Forensics 7.2.x before 7.2.7 allows remote attackers to bypass authentication, and obtain sensitive information or modify data, via unspecified vectors.
CVE-2016-5249 1 Lenovo 1 Solution Center 2016-07-01 7.2 HIGH 7.8 HIGH
Lenovo Solution Center (LSC) before 3.3.003 allows local users to execute arbitrary code with LocalSystem privileges via vectors involving the LSC.Services.SystemService StartProxy command with a named pipe created in advance and crafted .NET assembly.
CVE-2016-0374 1 Ibm 1 Tririga Application Platform 2016-07-01 6.5 MEDIUM 8.8 HIGH
The builder tools in IBM TRIRIGA Application Platform 3.3 before 3.3.2.6, 3.4 before 3.4.2.4, and 3.5 before 3.5.0.2 allow remote authenticated users to gain privileges for application modification via unspecified vectors.
CVE-2015-0257 1 Redhat 1 Enterprise Virtualization Manager 2016-06-28 2.1 LOW N/A
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.
CVE-2016-5087 1 Alertus 1 Alertus Desktop Notification For Os X 2016-06-28 3.6 LOW 4.4 MEDIUM
Alertus Desktop Notification before 2.9.31.1710 on OS X uses weak permissions for configuration files and unspecified other files, which allows local users to suppress emergency notifications or change content via standard filesystem operations.
CVE-2015-2686 1 Linux 1 Linux Kernel 2016-06-27 7.2 HIGH 7.8 HIGH
net/socket.c in the Linux kernel 3.19 before 3.19.3 does not validate certain range data for (1) sendto and (2) recvfrom system calls, which allows local users to gain privileges by leveraging a subsystem that uses the copy_from_iter function in the iov_iter interface, as demonstrated by the Bluetooth subsystem.
CVE-2016-5723 1 Huawei 1 Fusioninsight Hd 2016-06-27 7.2 HIGH 7.8 HIGH
Huawei FusionInsight HD before V100R002C60SPC200 allows local users to gain root privileges via unspecified vectors.
CVE-2016-4440 1 Linux 1 Linux Kernel 2016-06-27 7.2 HIGH 7.8 HIGH
arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode.
CVE-2016-1183 1 Nttdata 1 Terasoluna Server Framework For Java Web 2016-06-23 4.3 MEDIUM 3.7 LOW
NTT Data TERASOLUNA Server Framework for Java(WEB) 2.0.0.1 through 2.0.6.1, as used in Fujitsu Interstage Business Application Server and other products, allows remote attackers to bypass a file-extension protection mechanism, and consequently read arbitrary files, via a crafted pathname.
CVE-2016-2363 1 Fonality 1 Fonality 2016-06-21 7.2 HIGH 7.8 HIGH
Fonality (previously trixbox Pro) 12.6 through 14.1i before 2016-06-01 uses weak permissions for the /var/www/rpc/surun script, which allows local users to obtain root access for unspecified command execution by leveraging access to the nobody account.
CVE-2016-1196 1 Cybozu 1 Garoon 2016-06-21 4.0 MEDIUM 4.3 MEDIUM
Cybozu Garoon 3.x and 4.x before 4.2.1 allows remote authenticated users to bypass intended access restrictions and obtain sensitive Address Book information via an API call, a different vulnerability than CVE-2015-7776.
CVE-2016-4158 2 Adobe, Microsoft 2 Creative Cloud, Windows 2016-06-20 6.9 MEDIUM 7.3 HIGH
Unquoted Windows search path vulnerability in Adobe Creative Cloud Desktop Application before 3.7.0.272 on Windows allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory.
CVE-2016-4157 1 Adobe 1 Creative Cloud 2016-06-17 6.9 MEDIUM 7.3 HIGH
Untrusted search path vulnerability in the installer in Adobe Creative Cloud Desktop Application before 3.7.0.272 on Windows allows local users to gain privileges via a Trojan horse resource in an unspecified directory.
CVE-2016-2492 1 Google 2 Android, Android One 2016-06-16 9.3 HIGH 7.8 HIGH
The MediaTek power-management driver in Android before 2016-06-01 on Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 28085410.
CVE-2015-1814 2 Jenkins, Redhat 2 Jenkins, Openshift 2016-06-15 7.5 HIGH N/A
The API token-issuing service in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to gain privileges via a "forced API token change" involving anonymous users.
CVE-2015-1806 2 Jenkins, Redhat 2 Jenkins, Openshift 2016-06-15 6.5 MEDIUM N/A
The combination filter Groovy script in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with job configuration permission to gain privileges and execute arbitrary code on the master via unspecified vectors.
CVE-2015-1810 2 Jenkins, Redhat 2 Jenkins, Openshift 2016-06-15 4.6 MEDIUM N/A
The HudsonPrivateSecurityRealm class in Jenkins before 1.600 and LTS before 1.596.1 does not restrict access to reserved names when using the "Jenkins' own user database" setting, which allows remote attackers to gain privileges by creating a reserved name.
CVE-2014-3665 1 Jenkins 1 Jenkins 2016-06-15 6.8 MEDIUM N/A
Jenkins before 1.587 and LTS before 1.580.1 do not properly ensure trust separation between a master and slaves, which might allow remote attackers to execute arbitrary code on the master by leveraging access to the slave.
CVE-2014-3663 2 Jenkins, Redhat 2 Jenkins, Openshift 2016-06-15 6.0 MEDIUM N/A
Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Job/CONFIGURE permission to bypass intended restrictions and create or destroy arbitrary jobs via unspecified vectors.
CVE-2016-5365 1 Huawei 2 Honor Ws851, Honor Ws851 Firmware 2016-06-14 10.0 HIGH 9.8 CRITICAL
Stack-based buffer overflow in Huawei Honor WS851 routers with software 1.1.21.1 and earlier allows remote attackers to execute arbitrary commands with root privileges via unspecified vectors, aka HWPSIRT-2016-05051.
CVE-2016-2493 1 Google 1 Android 2016-06-14 9.3 HIGH 7.8 HIGH
The Broadcom Wi-Fi driver in Android before 2016-06-01 on Nexus 5, Nexus 6, Nexus 6P, Nexus 7 (2013), Nexus Player, and Pixel C devices allows attackers to gain privileges via a crafted application, aka internal bug 26571522.
CVE-2016-2490 1 Google 1 Android 2016-06-14 9.3 HIGH 7.8 HIGH
The NVIDIA camera driver in Android before 2016-06-01 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 27533373.
CVE-2016-2488 1 Google 1 Android 2016-06-14 9.3 HIGH 7.8 HIGH
The Qualcomm camera driver in Android before 2016-06-01 on Nexus 5, 5X, 6, 6P, and 7 (2013) devices allows attackers to gain privileges via a crafted application, aka internal bug 27600832.
CVE-2016-2489 1 Google 1 Android 2016-06-14 9.3 HIGH 7.8 HIGH
The Qualcomm video driver in Android before 2016-06-01 on Nexus 5, 5X, 6, and 6P devices allows attackers to gain privileges via a crafted application, aka internal bug 27407629.
CVE-2016-2496 1 Google 1 Android 2016-06-14 10.0 HIGH 9.8 CRITICAL
The Framework UI permission-dialog implementation in Android 6.x before 2016-06-01 allows attackers to conduct tapjacking attacks and access arbitrary private-storage files by creating a partially overlapping window, aka internal bug 26677796.
CVE-2014-2068 1 Jenkins 1 Jenkins 2016-06-13 3.5 LOW N/A
The doIndex function in hudson/util/RemotingDiagnostics.java in CloudBees Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users with the ADMINISTER permission to obtain sensitive information via vectors related to heapDump.
CVE-2014-2058 1 Jenkins 1 Jenkins 2016-06-13 6.5 MEDIUM N/A
BuildTrigger in Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users to bypass access restrictions and execute arbitrary jobs by configuring a job to trigger another job. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7330.
CVE-2013-7330 1 Jenkins 1 Jenkins 2016-06-13 4.0 MEDIUM N/A
Jenkins before 1.502 allows remote authenticated users to configure an otherwise restricted project via vectors related to post-build actions.
CVE-2015-4351 1 Web-dorado 1 Web-dorado Spider Video Player 2016-06-09 4.9 MEDIUM N/A
The Spider Video Player module for Drupal allows remote authenticated users with the "access Spider Video Player administration" permission to delete arbitrary files via a crafted URL.
CVE-2015-4344 1 Services Basic Authentication Project 1 Services Basic Authentication 2016-06-09 5.0 MEDIUM N/A
The Services Basic Authentication module 7.x-1.x through 7.x-1.3 for Drupal allows remote attackers to bypass intended resource restrictions via vectors related to page caching.
CVE-2015-4389 1 Open Graph Importer Project 1 Open Graph Importer 2016-06-09 4.0 MEDIUM N/A
The Open Graph Importer (og_tag_importer) 7.x-1.x for Drupal does not properly check the create permission for content types created during import, which allows remote authenticated users to bypass intended restrictions by leveraging the "import og_tag_importer" permission.
CVE-2015-4394 1 Services Project 1 Services 2016-06-09 5.0 MEDIUM N/A
The Services module 7.x-3.x before 7.x-3.12 for Drupal allows remote attackers to bypass the field_access restriction and obtain sensitive private field information via unspecified vectors.
CVE-2016-3738 1 Redhat 1 Openshift 2016-06-09 6.5 MEDIUM 8.8 HIGH
Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.
CVE-2016-2160 1 Redhat 2 Openshift, Openshift Origin 2016-06-09 9.0 HIGH 8.8 HIGH
Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image.
CVE-2016-4505 1 Resourcedm 1 Intuitive 650 Tdb Controller 2016-06-07 9.0 HIGH 8.8 HIGH
Resource Data Management (RDM) Intuitive 650 TDB Controller devices before 2.1.24 allow remote authenticated users to modify arbitrary passwords via unspecified vectors.
CVE-2014-9023 1 Twilio Project 1 Twilio 2016-06-02 5.5 MEDIUM N/A
The Twilio module 7.x-1.x before 7.x-1.9 for Drupal does not properly restrict access to the Twilio administration pages, which allows remote authenticated users to read and modify authentication tokens by leveraging the "access administration pages" Drupal permission.
CVE-2011-3129 1 Wordpress 1 Wordpress 2016-05-31 9.3 HIGH N/A
The file upload functionality in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2, when running "on hosts with dangerous security settings," has unknown impact and attack vectors, possibly related to dangerous filenames.
CVE-2016-1887 1 Freebsd 1 Freebsd 2016-05-26 7.2 HIGH 7.8 HIGH
Integer signedness error in the sockargs function in sys/kern/uipc_syscalls.c in FreeBSD 10.1 before p34, 10.2 before p17, and 10.3 before p3 allows local users to cause a denial of service (memory overwrite and kernel panic) or gain privileges via a negative buflen argument, which triggers a heap-based buffer overflow.
CVE-2015-8577 1 Mcafee 1 Virusscan Enterprise 2016-05-26 2.6 LOW N/A
The Buffer Overflow Protection (BOP) feature in McAfee VirusScan Enterprise before 8.8 Patch 6 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses on 32-bit platforms when protecting another application, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.
CVE-2016-2855 1 Huawei 1 Mobile Broadband Hl Service 2016-05-25 7.2 HIGH 7.8 HIGH
The Huawei Mobile Broadband HL Service 22.001.25.00.03 and earlier uses a weak ACL for the MobileBrServ program data directory, which allows local users to gain SYSTEM privileges by modifying VERSION.dll.
CVE-2016-1580 1 Canonical 2 Ubuntu-core-launcher, Ubuntu Linux 2016-05-19 10.0 HIGH 9.8 CRITICAL
The setup_snappy_os_mounts function in the ubuntu-core-launcher package before 1.0.27.1 improperly determines the mount point of bind mounts when using snaps, which might allow remote attackers to obtain sensitive information or gain privileges via a snap with a name starting with "ubuntu-core."
CVE-2015-1498 1 Persistent Systems 1 Radia Client Automation 2016-05-18 10.0 HIGH N/A
Persistent Systems Radia Client Automation does not properly restrict access to certain request, which allows remote attackers to (1) enumerate user accounts via a getUsers request, (2) assign a role to a user account via an addAssigneesToRole request, (3) remove a role from a user account via a removeAssigneesFromRole request, or (4) have other unspecified impact.
CVE-2016-0707 1 Apache 1 Ambari 2016-05-18 2.1 LOW 3.3 LOW
The agent in Apache Ambari before 2.1.2 uses weak permissions for the (1) /var/lib/ambari-agent/data and (2) /var/lib/ambari-agent/keys directories, which allows local users to obtain sensitive information by reading files in the directories.
CVE-2016-2456 1 Google 2 Android, Android One 2016-05-16 5.1 MEDIUM 7.0 HIGH
The MediaTek Wi-Fi driver in Android before 2016-05-01 on Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 27275187.