CodeAnt AI home pagelight logodark logo
  • Dashboard
  • Dashboard
  • Documentation
  • Demo Call with CEO
  • Blog
  • Slack
  • Get Started
    • CodeAnt AI
    • Setup
    • Control Center
    • Pull Request Review
    • IDE
    • Compliance
    • Anti-Patterns
    • Code Governance
    • Infrastructure Security Database
    • Application Security Database
      • Apex
      • Bash
      • C
      • Clojure
      • Cpp
        • Lang
          • Correctness
          • Security
            • Containers
            • Crypto
            • Filesystem
              • File-access-before-action
              • File-stat-before-action
              • Path-manipulation
              • World-writable-file
                • World writable file
            • Format-string
            • Ldap
            • Libraries
            • Memory
            • Misc
            • Rng
            • Sql
            • Strings
            • System-command
            • Uri
            • Use-after-free
        • Libxml2
      • Csharp
      • Dockerfile
      • Elixir
      • Fingerprints
      • Generic
      • Go
      • Html
      • Java
      • Javascript
      • Json
      • Kotlin
      • Ocaml
      • Php
      • Problem-based-packs
      • Python
      • Ruby
      • Rust
      • Scala
      • Solidity
      • Swift
      • Terraform
      • Typescript
      • Yaml
    World-writable-file

    World writable file

    This call makes a world-writable file which allows any user on a machine to write to the file. This may allow attackers to influence the behaviour of this process by writing to the file.
    Likelihood: MEDIUM
    Confidence: HIGH
    CWE:
    - CWE-732: Incorrect Permission Assignment for Critical Resource

    Path manipulationFormat string injection
    twitterlinkedin
    Powered by Mintlify
    Assistant
    Responses are generated using AI and may contain mistakes.