Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2019-07-02 CVE-2019-13173 Link Following vulnerability in Fstream Project Fstream
fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite.
network
low complexity
fstream-project CWE-59
7.5
2019-06-12 CVE-2019-1069 Link Following vulnerability in Microsoft products
An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations, aka 'Task Scheduler Elevation of Privilege Vulnerability'.
local
low complexity
microsoft CWE-59
7.8
2019-06-12 CVE-2019-1064 Link Following vulnerability in Microsoft products
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'.
local
low complexity
microsoft CWE-59
7.8
2019-06-12 CVE-2019-1053 Link Following vulnerability in Microsoft products
An elevation of privilege vulnerability exists when the Windows Shell fails to validate folder shortcuts, aka 'Windows Shell Elevation of Privilege Vulnerability'.
local
low complexity
microsoft CWE-59
8.8
2019-06-12 CVE-2019-0986 Link Following vulnerability in Microsoft products
An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile Service Elevation of Privilege Vulnerability'.
local
low complexity
microsoft CWE-59
7.1
2019-06-11 CVE-2019-12749 Link Following vulnerability in multiple products
dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library.
local
low complexity
freedesktop canonical CWE-59
7.1
2019-06-07 CVE-2019-12779 Link Following vulnerability in Clusterlabs Libqb
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
local
low complexity
clusterlabs CWE-59
7.1
2019-06-04 CVE-2019-12209 Link Following vulnerability in Yubico Pam-U2F 1.0.7
Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root.
network
low complexity
yubico CWE-59
7.5
2019-06-03 CVE-2019-3567 Link Following vulnerability in Linuxfoundation Osquery
In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions.
network
high complexity
linuxfoundation CWE-59
8.1
2019-05-23 CVE-2019-9949 Link Following vulnerability in Westerndigital products
Western Digital My Cloud Cloud, Mirror Gen2, EX2 Ultra, EX2100, EX4100, DL2100, DL4100, PR2100 and PR4100 before firmware 2.31.183 are affected by a code execution (as root, starting from a low-privilege user session) vulnerability.
network
low complexity
westerndigital CWE-59
8.8