Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2000-04-28 CVE-2000-0342 Link Following vulnerability in Qualcomm Eudora 4.0
Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
network
low complexity
qualcomm CWE-59
7.5
1999-12-31 CVE-1999-1386 Link Following vulnerability in Perl
Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file.
local
low complexity
perl CWE-59
5.5
1998-06-16 CVE-1999-0783 Link Following vulnerability in Freebsd 2.2
FreeBSD allows local users to conduct a denial of service by creating a hard link from a device special file to a file on an NFS file system.
local
low complexity
freebsd CWE-59
5.5