Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2021-02-09 CVE-2021-21125 Link Following vulnerability in multiple products
Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
network
low complexity
google microsoft CWE-59
8.1
2021-02-09 CVE-2021-21117 Link Following vulnerability in Google Chrome
Insufficient policy enforcement in Cryptohome in Google Chrome prior to 88.0.4324.96 allowed a local attacker to perform OS-level privilege escalation via a crafted file.
local
low complexity
google CWE-59
7.8
2021-02-05 CVE-2020-36241 Link Following vulnerability in multiple products
autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.
local
low complexity
gnome fedoraproject CWE-59
5.5
2021-01-28 CVE-2020-8585 Link Following vulnerability in Netapp Oncommand Unified Manager
OnCommand Unified Manager Core Package versions prior to 5.2.5 may disclose sensitive account information to unauthorized users via the use of PuTTY Link (plink).
local
low complexity
netapp CWE-59
5.5
2021-01-25 CVE-2021-21272 Link Following vulnerability in Deislabs Oras
ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries.
network
low complexity
deislabs CWE-59
7.7
2021-01-21 CVE-2020-4966 Link Following vulnerability in IBM Security Identity Governance and Intelligence 5.2.6
IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies.
network
low complexity
ibm CWE-59
4.3
2021-01-20 CVE-2021-1278 Link Following vulnerability in Cisco products
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device.
network
low complexity
cisco CWE-59
7.5
2021-01-18 CVE-2020-36193 Link Following vulnerability in multiple products
Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.
network
low complexity
php fedoraproject debian drupal CWE-59
7.5
2021-01-13 CVE-2021-1145 Link Following vulnerability in Cisco Staros
A vulnerability in the Secure FTP (SFTP) of Cisco StarOS for Cisco ASR 5000 Series Routers could allow an authenticated, remote attacker to read arbitrary files on an affected device.
network
low complexity
cisco CWE-59
6.5
2021-01-13 CVE-2021-21602 Link Following vulnerability in Jenkins
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.
network
low complexity
jenkins CWE-59
6.5