Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2021-11-14 CVE-2021-41057 Link Following vulnerability in multiple products
In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.
local
low complexity
wibu siemens CWE-59
7.1
2021-11-10 CVE-2021-41379 Link Following vulnerability in Microsoft products
Windows Installer Elevation of Privilege Vulnerability
local
low complexity
microsoft CWE-59
5.5
2021-11-09 CVE-2021-3641 Link Following vulnerability in Bitdefender Gravityzone
Improper Link Resolution Before File Access ('Link Following') vulnerability in the EPAG component of Bitdefender Endpoint Security Tools for Windows allows a local attacker to cause a denial of service.
local
low complexity
bitdefender CWE-59
6.1
2021-11-04 CVE-2021-21686 Link Following vulnerability in Jenkins
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
network
low complexity
jenkins CWE-59
8.1
2021-11-04 CVE-2021-21691 Link Following vulnerability in Jenkins
Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
network
low complexity
jenkins CWE-59
critical
9.8
2021-11-04 CVE-2021-21695 Link Following vulnerability in Jenkins
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
network
low complexity
jenkins CWE-59
8.8
2021-10-28 CVE-2021-22488 Link Following vulnerability in Huawei Emui and Magic UI
There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups.
network
low complexity
huawei CWE-59
7.5
2021-10-08 CVE-2021-37969 Link Following vulnerability in multiple products
Inappropriate implementation in Google Updater in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to perform local privilege escalation via a crafted file.
local
low complexity
google fedoraproject debian CWE-59
7.8
2021-09-28 CVE-2021-36286 Link Following vulnerability in Dell Supportassist Client Consumer
Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links.
local
low complexity
dell CWE-59
7.1
2021-09-27 CVE-2021-34408 Link Following vulnerability in Zoom Meetings
The Zoom Client for Meetings for Windows in all versions before version 5.3.2 writes log files to a user writable directory as a privileged user during the installation or update of the client.
local
low complexity
zoom CWE-59
7.8