Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-05-14 | CVE-2024-32002 | Link Following vulnerability in GIT Git is a revision control system. | 9.0 |
2024-05-03 | CVE-2023-34283 | Link Following vulnerability in Netgear Rax30 Firmware NETGEAR RAX30 USB Share Link Following Information Disclosure Vulnerability. | 4.6 |
2024-03-28 | CVE-2024-25952 | Link Following vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains an UNIX symbolic link (symlink) following vulnerability. | 6.0 |
2024-03-28 | CVE-2024-25953 | Link Following vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 9.4.0.x through 9.7.0.x contains an UNIX symbolic link (symlink) following vulnerability. | 6.0 |
2024-03-08 | CVE-2024-23285 | Link Following vulnerability in Apple Macos This issue was addressed with improved handling of symlinks. | 5.5 |
2024-02-21 | CVE-2023-42942 | Link Following vulnerability in Apple products This issue was addressed with improved handling of symlinks. | 7.8 |
2024-02-06 | CVE-2023-32454 | Link Following vulnerability in Dell Update Package Framework 3.8.3.67/4.9.4.36 DUP framework version 4.9.4.36 and prior contains insecure operation on Windows junction/Mount point vulnerability. | 7.1 |
2024-02-06 | CVE-2023-32474 | Link Following vulnerability in Dell Display Manager 2.0.0/2.1.0/2.1.1 Dell Display Manager application, version 2.1.1.17 and prior, contain an insecure operation on windows junction/mount point. | 6.6 |
2024-02-05 | CVE-2023-52138 | Link Following vulnerability in Mate-Desktop Engrampa Engrampa is an archive manager for the MATE environment. | 9.6 |
2024-01-23 | CVE-2023-47192 | Link Following vulnerability in Trendmicro Apex ONE 2019 An agent link vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | 7.8 |