Vulnerabilities (CVE)

Filtered by CWE-59
Total 1131 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2014-5459 3 Opensuse, Oracle, Php 4 Evergreen, Opensuse, Solaris and 1 more 2021-03-29 3.6 LOW N/A
The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
CVE-2021-3310 1 Westerndigital 9 My Cloud Dl2100, My Cloud Dl4100, My Cloud Ex2100 and 6 more 2021-03-17 4.6 MEDIUM 7.8 HIGH
Western Digital My Cloud OS 5 devices before 5.10.122 mishandle Symbolic Link Following on SMB and AFP shares. This can lead to code execution and information disclosure (by reading local files).
CVE-2013-1888 2 Fedoraproject, Pypa 2 Fedora, Pip 2021-03-15 2.1 LOW N/A
pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.
CVE-2002-0824 1 Freebsd 1 Point-to-point Protocol Daemon 2021-03-11 6.9 MEDIUM N/A
BSD pppd allows local users to change the permissions of arbitrary files via a symlink attack on a file that is specified as a tty device.
CVE-2020-29529 1 Hashicorp 1 Go-slug 2021-03-08 5.0 MEDIUM 7.5 HIGH
HashiCorp go-slug up to 0.4.3 did not fully protect against directory traversal while unpacking tar archives, and protections could be bypassed with specific constructions of multiple symlinks. Fixed in 0.5.0.
CVE-2020-12878 1 Digi 2 Connectport X2e, Connectport X2e Firmware 2021-02-26 7.2 HIGH 7.8 HIGH
Digi ConnectPort X2e before 3.2.30.6 allows an attacker to escalate privileges from the python user to root via a symlink attack that uses chown, related to /etc/init.d/S50dropbear.sh and the /WEB/python/.ssh directory.
CVE-2020-8585 1 Netapp 1 Oncommand Unified Manager 2021-02-03 2.1 LOW 5.5 MEDIUM
OnCommand Unified Manager Core Package versions prior to 5.2.5 may disclose sensitive account information to unauthorized users via the use of PuTTY Link (plink).
CVE-2020-4966 1 Ibm 1 Security Identity Governance And Intelligence 2021-01-28 4.3 MEDIUM 4.3 MEDIUM
IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 192423.
CVE-2020-35766 1 Opendkim 1 Opendkim 2020-12-30 4.4 MEDIUM 7.8 HIGH
The test suite in libopendkim in OpenDKIM through 2.10.3 allows local users to gain privileges via a symlink attack against the /tmp/testkeys file (related to t-testdata.h, t-setup.c, and t-cleanup.c). NOTE: this is applicable to persons who choose to engage in the "A number of self-test programs are included here for unit-testing the library" situation.
CVE-2020-28641 1 Malwarebytes 2 Endpoint Protection, Malwarebytes 2020-12-23 6.6 MEDIUM 7.1 HIGH
In Malwarebytes Free 4.1.0.56, a symbolic link may be used delete an arbitrary file on the system by exploiting the local quarantine system.
CVE-2020-26277 1 Dbdeployer 1 Dbdeployer 2020-12-23 4.0 MEDIUM 6.1 MEDIUM
DBdeployer is a tool that deploys MySQL database servers easily. In DBdeployer before version 1.58.2, users unpacking a tarball may use a maliciously packaged tarball that contains symlinks to files external to the target. In such scenario, an attacker could induce dbdeployer to write into a system file, thus altering the computer defenses. For the attack to succeed, the following factors need to contribute: 1) The user is logged in as root. While dbdeployer is usable as root, it was designed to run as unprivileged user. 2) The user has taken a tarball from a non secure source, without testing the checksum. When the tarball is retrieved through dbdeployer, the checksum is compared before attempting to unpack. This has been fixed in version 1.58.2.
CVE-2020-5797 1 Tp-link 2 Archer C9, Archer C9 Firmware 2020-12-03 3.6 LOW 6.1 MEDIUM
UNIX Symbolic Link (Symlink) Following in TP-Link Archer C9(US)_V1_180125 firmware allows an unauthenticated actor, with physical access and network access, to read sensitive files and write to a limited set of files after plugging a crafted USB drive into the router.
CVE-2020-23968 1 Ilex 1 International Sign\&go 2020-12-01 6.9 MEDIUM 7.8 HIGH
Ilex International Sign&go Workstation Security Suite 7.1 allows elevation of privileges via a symlink attack on ProgramData\Ilex\S&G\Logs\000-sngWSService1.log.
CVE-2020-8015 2 Exim, Opensuse 2 Exim, Opensuse 2020-11-20 7.2 HIGH 7.8 HIGH
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.
CVE-2019-3690 1 Opensuse 1 Leap 2020-11-20 7.2 HIGH 7.8 HIGH
The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.
CVE-2020-5795 1 Tp-link 2 Archer A7, Archer A7 Firmware 2020-11-19 7.2 HIGH 6.2 MEDIUM
UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router.
CVE-2020-6015 1 Checkpoint 1 Endpoint Security 2020-11-17 2.1 LOW 5.5 MEDIUM
Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations.
CVE-2009-0035 1 Alsa-project 1 Alsa 2020-11-16 3.6 LOW 5.5 MEDIUM
alsa-utils 1.0.19 and later versions allows local users to overwrite arbitrary files via a symlink attack via the /usr/bin/alsa-info and /usr/bin/alsa-info.sh scripts.
CVE-2010-3879 1 Libfuse Project 1 Libfuse 2020-11-10 5.8 MEDIUM N/A
FUSE, possibly 2.8.5 and earlier, allows local users to create mtab entries with arbitrary pathnames, and consequently unmount any filesystem, via a symlink attack on the parent directory of the mountpoint of a FUSE filesystem, a different vulnerability than CVE-2010-0789.
CVE-2018-21269 1 Openrc Project 1 Openrc 2020-11-02 2.1 LOW 5.5 MEDIUM
checkpath in OpenRC through 0.42.1 might allow local users to take ownership of arbitrary files because a non-terminal path component can be a symlink.