Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2019-12-10 CVE-2019-1483 Link Following vulnerability in Microsoft products
An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'.
local
low complexity
microsoft CWE-59
7.8
2019-12-10 CVE-2013-4184 Link Following vulnerability in multiple products
Perl module Data::UUID from CPAN version 1.219 vulnerable to symlink attacks
local
low complexity
data debian CWE-59
5.5
2019-12-05 CVE-2019-7183 Link Following vulnerability in Qnap QTS
This improper link resolution vulnerability allows remote attackers to access system files.
network
low complexity
qnap CWE-59
critical
9.8
2019-12-03 CVE-2019-3750 Link Following vulnerability in Dell Command Update
Dell Command Update versions prior to 3.1 contain an Arbitrary File Deletion Vulnerability.
local
low complexity
dell CWE-59
5.5
2019-12-03 CVE-2019-3749 Link Following vulnerability in Dell Command Update
Dell Command Update versions prior to 3.1 contain an Arbitrary File Deletion Vulnerability.
local
low complexity
dell CWE-59
5.5
2019-11-26 CVE-2011-3632 Link Following vulnerability in multiple products
Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks.
local
low complexity
hardlink-project redhat debian CWE-59
7.1
2019-11-25 CVE-2011-3351 Link Following vulnerability in Openvas Openvas-Scanner
openvas-scanner before 2011-09-11 creates a temporary file insecurely when generating OVAL system characteristics document with the ovaldi integrated tool enabled.
local
low complexity
openvas CWE-59
7.1
2019-11-22 CVE-2019-17445 Link Following vulnerability in Eracent products
An issue was discovered in Eracent EDA, EPA, EPM, EUA, FLW, and SUM Agent through 10.2.26.
local
low complexity
eracent CWE-59
5.5
2019-11-21 CVE-2019-19191 Link Following vulnerability in Shibboleth Service Provider
Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a directory controlled by the service user (the shibd account) after installation.
local
low complexity
shibboleth CWE-59
7.8
2019-11-21 CVE-2014-1938 Link Following vulnerability in Rply Project Rply
python-rply before 0.7.4 insecurely creates temporary files.
local
low complexity
rply-project CWE-59
5.5