Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2023-04-11 CVE-2022-38604 Link Following vulnerability in Wacom Driver 6.3.451/6.3.461
Wacom Driver 6.3.46-1 for Windows and lower was discovered to contain an arbitrary file deletion vulnerability.
local
low complexity
wacom CWE-59
7.3
2023-04-11 CVE-2022-43293 Link Following vulnerability in Wacom Driver 6.3.451/6.3.461
Wacom Driver 6.3.46-1 for Windows was discovered to contain an arbitrary file write vulnerability via the component \Wacom\Wacom_Tablet.exe.
low complexity
wacom CWE-59
5.9
2023-04-06 CVE-2023-0652 Link Following vulnerability in Cloudflare Warp
Due to a hardlink created in the ProgramData folder during the repair process of the software, the installer (MSI) of WARP Client for Windows (<= 2022.12.582.0) allowed a malicious attacker to forge the destination of the hardlink and escalate privileges, overwriting SYSTEM protected files. As Cloudflare WARP client for Windows (up to version 2022.5.309.0) allowed creation of mount points from its ProgramData folder, during installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
local
low complexity
cloudflare CWE-59
7.8
2023-04-05 CVE-2023-1412 Link Following vulnerability in Cloudflare Warp
An unprivileged (non-admin) user can exploit an Improper Access Control vulnerability in the Cloudflare WARP Client for Windows (<= 2022.12.582.0) to perform privileged operations with SYSTEM context by working with a combination of opportunistic locks (oplock) and symbolic links (which can both be created by an unprivileged user). After installing the Cloudflare WARP Client (admin privileges required), an MSI-Installer is placed under C:\Windows\Installer.
local
low complexity
cloudflare CWE-59
7.8
2023-03-31 CVE-2022-47188 Link Following vulnerability in Generex Cs141 Firmware
There is an arbitrary file reading vulnerability in Generex UPS CS141 below 2.06 version.
network
low complexity
generex CWE-59
7.5
2023-03-29 CVE-2023-28642 Link Following vulnerability in Linuxfoundation Runc
runc is a CLI tool for spawning and running containers according to the OCI specification.
local
low complexity
linuxfoundation CWE-59
7.8
2023-03-29 CVE-2023-28892 Link Following vulnerability in Malwarebytes Adwcleaner
Malwarebytes AdwCleaner 8.4.0 runs as Administrator and performs an insecure file delete operation on C:\AdwCleaner\Logs\AdwCleaner_Debug.log in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link.
local
low complexity
malwarebytes CWE-59
7.8
2023-03-23 CVE-2023-26088 Link Following vulnerability in Malwarebytes
In Malwarebytes before 4.5.23, a symbolic link may be used delete any arbitrary file on the system by exploiting the local quarantine system.
local
low complexity
malwarebytes CWE-59
7.8
2023-03-21 CVE-2023-1314 Link Following vulnerability in Cloudflare Cloudflared
A vulnerability has been discovered in cloudflared's installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device.
local
low complexity
cloudflare CWE-59
7.8
2023-03-13 CVE-2023-24577 Link Following vulnerability in Mcafee Total Protection
McAfee Total Protection prior to 16.0.50 allows attackers to elevate user privileges due to Improper Link Resolution via registry keys.
local
low complexity
mcafee CWE-59
5.5