CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
The wp-invoice plugin before 4.1.1 for WordPress has incorrect access control over wpi_twocheckout payer metadata updates. |
The wp-invoice plugin before 4.1.1 for WordPress has incorrect access control over wpi_interkassa payer metadata updates. |
The wp-invoice plugin before 4.1.1 for WordPress has incorrect access control over wpi_paypal payer metadata updates. |
The wp-invoice plugin before 4.1.1 for WordPress has incorrect access control over wpi_user_id for invoice retrieval. |
The wp-invoice plugin before 4.1.1 for WordPress has incorrect access control for admin_init settings changes. |
cPanel before 11.54.0.4 allows arbitrary code execution during locale duplication (SEC-72). |
An issue was discovered on TOTOLINK A850R-V1 through 1.0.1-B20150707.1612 and F1-V2 through 1.1-B20150708.1646 devices. By sending a specific hel,xasf packet to the WAN interface, it is possible to open the web management interface on the WAN interface. |
Pen 0.18.0 has Insecure Temporary File Creation vulnerabilities |
OpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution |
In a openshift node, there is a cron job to update mcollective facts that mishandles a temporary file. This may lead to loss of confidentiality and integrity. |
An insecurity temporary file vulnerability exists in RHQ Mongo DB Drift Server through 2013-09-25 when unpacking zipped files. |
Insecure temporary file vulnerability in RedHat vsdm 4.9.6. |
Monkey HTTP Daemon has local security bypass |
OpenShift haproxy cartridge: predictable /tmp in set-proxy connection hook which could facilitate DoS |
python-docutils allows insecure usage of temporary files |
gri before 2.12.18 generates temporary files in an insecure way. |
Mounting /proc filesystem via chroot command silently mounts it in read-write mode. The user could bypass the chroot environment and gain write access to files, he would never have otherwise. |
Mondo 2.24 has insecure handling of temporary files. |
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. |
Software installed and run as a non-privileged user may conduct improper GPU system calls to gain access to the graphics buffers of a parent process. |