Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2004-12-31 CVE-2004-2473 Link Following vulnerability in Wmfrog 0.1.6
wmFrog weather monitor 0.1.6 and other versions before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
local
high complexity
wmfrog CWE-59
1.2
2004-12-31 CVE-2004-1901 Link Following vulnerability in Gentoo Linux and Portage
Portage before 2.0.50-r3 allows local users to overwrite arbitrary files via a hard link attack on the lockfiles.
local
low complexity
gentoo CWE-59
5.5
2004-10-18 CVE-2004-1603 Link Following vulnerability in Cpanel 9.4.1
cPanel 9.4.1-RELEASE-64 follows hard links, which allows local users to (1) read arbitrary files via the backup feature or (2) chown arbitrary files via the .htaccess file when Front Page extensions are enabled or disabled.
local
low complexity
cpanel CWE-59
5.5
2004-09-28 CVE-2004-0689 Link Following vulnerability in multiple products
KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow local users to create or truncate arbitrary files.
local
low complexity
kde debian CWE-59
7.1
2004-04-15 CVE-2004-0217 Link Following vulnerability in Symantec Antivirus Scan Engine 4.0/4.3
The LiveUpdate capability (liveupdate.sh) in Symantec AntiVirus Scan Engine 4.0 and 4.3 for Red Hat Linux allows local users to create or append to arbitrary files via a symlink attack on /tmp/LiveUpdate.log.
local
high complexity
symantec CWE-59
7.0
2003-12-31 CVE-2003-1528 Link Following vulnerability in Fujitsu Siemens Networker 6.0
nsr_shutdown in Fujitsu Siemens NetWorker 6.0 allows local users to overwrite arbitrary files via a symlink attack on the nsrsh[PID] temporary file.
local
low complexity
fujitsu CWE-59
7.2
2003-12-31 CVE-2003-1492 Link Following vulnerability in multiple products
Netscape Navigator 7.0.2 and Mozilla allows remote attackers to access cookie information in a different domain via an HTTP request for a domain with an extra .
network
low complexity
mozilla netscape CWE-59
5.0
2003-12-31 CVE-2003-1233 Link Following vulnerability in Pedestalsoftware Integrity Protection Driver 1.3
Pedestal Software Integrity Protection Driver (IPD) 1.3 and earlier allows privileged attackers, such as rootkits, to bypass file access restrictions to the Windows kernel by using the NtCreateSymbolicLinkObject function to create a symbolic link to (1) \Device\PhysicalMemory or (2) to a drive letter using the subst command.
network
low complexity
pedestalsoftware CWE-59
critical
9.8
2003-11-17 CVE-2003-0844 Link Following vulnerability in Schroepl MOD Gzip
mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode without the Apache log, allows local users to overwrite arbitrary files via (1) a symlink attack on predictable temporary filenames on Unix systems, or (2) an NTFS hard link on Windows systems when the "Strengthen default permissions of internal system objects" policy is not enabled.
local
low complexity
schroepl CWE-59
7.1
2003-08-18 CVE-2003-0578 Link Following vulnerability in IBM U2 Universe 10.0.0.9
cci_dir in IBM U2 UniVerse 10.0.0.9 and earlier creates hard links and unlinks files as root, which allows local users to gain privileges by deleting and overwriting arbitrary files.
local
low complexity
ibm CWE-59
7.8