Filtered by CWE-668
Total 654 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2013-4280 1 Redhat 3 Enterprise Virtualization, Storage, Virtual Desktop Server Manager 2024-11-21 5.5 Medium
Insecure temporary file vulnerability in RedHat vsdm 4.9.6.
CVE-2013-4253 1 Redhat 1 Openshift 2024-11-21 7.5 High
The deployment script in the unsupported "OpenShift Extras" set of add-on scripts, in Red Hat Openshift 1, installs a default public key in the root user's authorized_keys file.
CVE-2013-2183 1 Monkey-project 1 Monkey 2024-11-21 7.1 High
Monkey HTTP Daemon has local security bypass
CVE-2013-0163 1 Redhat 1 Openshift 2024-11-21 5.5 Medium
OpenShift haproxy cartridge: predictable /tmp in set-proxy connection hook which could facilitate DoS
CVE-2009-5042 2 Debian, Python-docutils Project 2 Debian Linux, Python-docutils 2024-11-21 9.1 Critical
python-docutils allows insecure usage of temporary files
CVE-2008-7291 2 Debian, Gri Project 2 Debian Linux, Gri 2024-11-21 9.8 Critical
gri before 2.12.18 generates temporary files in an insecure way.
CVE-2008-2544 1 Linux 1 Linux Kernel 2024-11-21 5.5 Medium
Mounting /proc filesystem via chroot command silently mounts it in read-write mode. The user could bypass the chroot environment and gain write access to files, he would never have otherwise.
CVE-2007-3915 1 Mandriva 1 Mondo 2024-11-21 9.1 Critical
Mondo 2.24 has insecure handling of temporary files.
CVE-2005-2351 2 Debian, Mutt 2 Debian Linux, Mutt 2024-11-20 5.5 Medium
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
CVE-2024-43704 1 Imaginationtech 1 Ddk 2024-11-18 8.4 High
Software installed and run as a non-privileged user may conduct improper GPU system calls to gain access to the graphics buffers of a parent process.
CVE-2024-24985 1 Intel 2 4th Generation Intel Xeon Processor Scalable Family, 5th Generation Intel Xeon Processor Scalable Family 2024-11-15 7.2 High
Exposure of resource to wrong sphere in some Intel(R) processors with Intel(R) ACTM may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2024-51754 2024-11-08 2.2 Low
Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance). This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.
CVE-2024-51755 2024-11-08 2.2 Low
Twig is a template language for PHP. In a sandbox, an attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the security check. This is a BC break. This issue has been patched in versions 3.11.2 and 3.14.1. All users are advised to upgrade. There are no known workarounds for this issue.
CVE-2024-42350 2024-08-06 3 Low
Biscuit is an authorization token with decentralized verification, offline attenuation and strong security policy enforcement based on a logic language. Third-party blocks can be generated without transferring the whole token to the third-party authority. Instead, a `ThirdPartyBlock` request can be sent, providing only the necessary info to generate a third-party block and to sign it: 1. the public key of the previous block (used in the signature), 2. the public keys part of the token symbol table (for public key interning in datalog expressions). A third-part block request forged by a malicious user can trick the third-party authority into generating datalog trusting the wrong keypair. Tokens with third-party blocks containing `trusted` annotations generated through a third party block request. This has been addressed in version 4 of the specification. Users are advised to update their implementations to conform. There are no known workarounds for this vulnerability.