Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2022-06-24 CVE-2021-42056 Link Following vulnerability in Thalesgroup Safenet Authentication Client 10.7.7
Thales Safenet Authentication Client (SAC) for Linux and Windows through 10.7.7 creates insecure temporary hid and lock files allowing a local attacker, through a symlink attack, to overwrite arbitrary files, and potentially achieve arbitrary command execution with high privileges.
local
low complexity
thalesgroup CWE-59
6.7
2022-06-21 CVE-2022-34008 Link Following vulnerability in Comodo Antivirus 12.2.2.8012
Comodo Antivirus 12.2.2.8012 has a quarantine flaw that allows privilege escalation.
local
low complexity
comodo CWE-59
7.8
2022-06-17 CVE-2022-25856 Link Following vulnerability in Argo Events Project Argo Events
The package github.com/argoproj/argo-events/sensors/artifacts before 1.7.1 are vulnerable to Directory Traversal in the (g *GitArtifactReader).Read() API in git.go.
network
low complexity
argo-events-project CWE-59
7.5
2022-06-15 CVE-2021-25261 Link Following vulnerability in Yandex Browser
Local privilege vulnerability in Yandex Browser for Windows prior to 22.5.0.862 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process.
local
low complexity
yandex CWE-59
7.8
2022-06-15 CVE-2022-28225 Link Following vulnerability in Yandex Browser
Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.684 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process.
local
low complexity
yandex CWE-59
7.8
2022-06-12 CVE-2021-41641 Link Following vulnerability in Deno
Deno <=1.14.0 file sandbox does not handle symbolic links correctly.
local
low complexity
deno CWE-59
8.4
2022-05-27 CVE-2022-30687 Link Following vulnerability in Trendmicro Maximum Security 2022 17.7
Trend Micro Maximum Security 2022 is vulnerable to a link following vulnerability that could allow a low privileged local user to manipulate the product's secure erase feature to delete arbitrary files.
local
low complexity
trendmicro CWE-59
7.1
2022-05-26 CVE-2022-26704 Link Following vulnerability in Apple mac OS X and Macos
A validation issue existed in the handling of symlinks and was addressed with improved validation of symlinks.
local
low complexity
apple CWE-59
7.8
2022-05-26 CVE-2022-26688 Link Following vulnerability in Apple mac OS X and Macos
An issue in the handling of symlinks was addressed with improved validation.
local
low complexity
apple CWE-59
4.4
2022-05-20 CVE-2022-31258 Link Following vulnerability in multiple products
In Checkmk before 1.6.0p29, 2.x before 2.0.0p25, and 2.1.x before 2.1.0b10, a site user can escalate to root by editing an OMD hook symlink.
local
low complexity
tribe29 checkmk CWE-59
6.7