Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2001-07-01 CVE-2001-1043 Link Following vulnerability in Argosoft FTP Server 1.2.2.2
ArGoSoft FTP Server 1.2.2.2 allows remote attackers to read arbitrary files and directories by uploading a .lnk (link) file that points to the target file.
network
low complexity
argosoft CWE-59
7.5
2001-01-09 CVE-2000-1178 Link Following vulnerability in Joseph Allen JOE 2.8
Joe text editor follows symbolic links when creating a rescue copy called DEADJOE during an abnormal exit, which allows local users to overwrite the files of other users whose joe session crashes.
local
low complexity
joseph-allen CWE-59
5.5
2000-12-19 CVE-2000-0972 Link Following vulnerability in HP Hp-Ux 11.00
HP-UX 11.00 crontab allows local users to read arbitrary files via the -e option by creating a symlink to the target file during the crontab session, quitting the session, and reading the error messages that crontab generates.
local
low complexity
hp CWE-59
5.5
2000-04-28 CVE-2000-0342 Link Following vulnerability in Qualcomm Eudora 4.0
Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
network
low complexity
qualcomm CWE-59
7.5
1999-12-31 CVE-1999-1386 Link Following vulnerability in Perl
Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file.
local
low complexity
perl CWE-59
5.5
1998-06-16 CVE-1999-0783 Link Following vulnerability in Freebsd 2.2
FreeBSD allows local users to conduct a denial of service by creating a hard link from a device special file to a file on an NFS file system.
local
low complexity
freebsd CWE-59
5.5