Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2021-08-03 CVE-2021-32803 Link Following vulnerability in multiple products
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection.
network
low complexity
tar-project oracle siemens CWE-59
8.1
2021-07-30 CVE-2021-32610 Link Following vulnerability in multiple products
In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193.
local
low complexity
php debian fedoraproject CWE-59
7.1
2021-07-30 CVE-2021-36983 Link Following vulnerability in Replaysorcery Project Replaysorcery 0.6.0
replay-sorcery-kms in Replay Sorcery 0.6.0 allows a local attacker to gain root privileges via a symlink attack on /tmp/replay-sorcery or /tmp/replay-sorcery/device.sock.
local
low complexity
replaysorcery-project CWE-59
7.8
2021-07-28 CVE-2021-32000 Link Following vulnerability in Suse Linux Enterprise Server and Opensuse Factory
A UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allows local attackers to delete arbitrary files.
local
low complexity
suse CWE-59
7.1
2021-07-22 CVE-2021-1091 Link Following vulnerability in Nvidia GPU Display Driver
NVIDIA GPU Display driver for Windows contains a vulnerability where an unprivileged user can create a file hard link that causes the driver to overwrite a file that requires elevated privilege to modify, which could lead to data loss or denial of service.
local
low complexity
nvidia CWE-59
7.1
2021-07-22 CVE-2021-1092 Link Following vulnerability in Nvidia GPU Display Driver
NVIDIA GPU Display Driver for Windows contains a vulnerability in the NVIDIA Control Panel application where it is susceptible to a Windows file system symbolic link attack where an unprivileged attacker can cause the applications to overwrite privileged files, resulting in potential denial of service or data loss.
local
low complexity
nvidia CWE-59
7.1
2021-07-12 CVE-2021-26089 Link Following vulnerability in Fortinet Forticlient
An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase.
local
low complexity
fortinet CWE-59
7.8
2021-07-07 CVE-2021-32509 Link Following vulnerability in Qsan Storage Manager
Absolute Path Traversal vulnerability in FileviewDoc in QSAN Storage Manager allows remote authenticated attackers access arbitrary files by injecting the Symbolic Link following the Url path parameter.
network
low complexity
qsan CWE-59
6.5
2021-07-07 CVE-2021-32518 Link Following vulnerability in Qsan Storage Manager
A vulnerability in share_link in QSAN Storage Manager allows remote attackers to create a symbolic link then access arbitrary files.
network
low complexity
qsan CWE-59
7.5
2021-06-24 CVE-2020-4885 Link Following vulnerability in IBM DB2 11.5
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow a local user to access and change the configuration of Db2 due to a race condition of a symbolic link,.
local
high complexity
ibm CWE-59
4.7