Vulnerabilities (CVE)

Filtered by CWE-59
Total 1140 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-12265 1 Decompress Project 1 Decompress 2021-07-21 7.5 HIGH 9.8 CRITICAL
The decompress package before 4.2.1 for Node.js is vulnerable to Arbitrary File Write via ../ in an archive member, when a symlink is used, because of Directory Traversal.
CVE-2019-1267 1 Microsoft 7 Windows 10, Windows 7, Windows 8.1 and 4 more 2021-07-21 7.2 HIGH 7.8 HIGH
An elevation of privilege vulnerability exists in Microsoft Compatibility Appraiser where a configuration file, with local privileges, is vulnerable to symbolic link and hard link attacks, aka 'Microsoft Compatibility Appraiser Elevation of Privilege Vulnerability'.
CVE-2020-7221 1 Mariadb 1 Mariadb 2021-07-21 7.2 HIGH 7.8 HIGH
mysql_install_db in MariaDB 10.4.7 through 10.4.11 allows privilege escalation from the mysql user account to root because chown and chmod are performed unsafely, as demonstrated by a symlink attack on a chmod 04755 of auth_pam_tool_dir/auth_pam_tool. NOTE: this does not affect the Oracle MySQL product, which implements mysql_install_db differently.
CVE-2020-27643 1 1e 1 Client 2021-07-21 4.0 MEDIUM 6.5 MEDIUM
The %PROGRAMDATA%\1E\Client directory in 1E Client 5.0.0.745 and 4.1.0.267 allows remote authenticated users and local users to create and modify files in protected directories (where they would not normally have access to create or modify files) via the creation of a junction point to a system directory. This leads to partial privilege escalation.
CVE-2020-24955 1 Superantispyware 1 Professional X 2021-07-21 7.2 HIGH 7.8 HIGH
SUPERAntiSyware Professional X Trial 10.0.1206 is vulnerable to local privilege escalation because it allows unprivileged users to restore a malicious DLL from quarantine into the system32 folder via an NTFS directory junction, as demonstrated by a crafted ualapi.dll file that is detected as malware.
CVE-2020-25776 1 Trendmicro 1 Antivirus 2021-07-21 7.2 HIGH 7.8 HIGH
Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a symbolic link privilege escalation attack where an attacker could exploit a critical file on the system to escalate their privileges. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2020-7653 1 Synk 1 Broker 2021-07-21 4.0 MEDIUM 6.5 MEDIUM
All versions of snyk-broker before 4.80.0 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users with access to Snyk's internal network by creating symlinks to match whitelisted paths.
CVE-2019-1270 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2021-07-21 3.6 LOW 5.5 MEDIUM
An elevation of privilege vulnerability exists in Windows store installer where WindowsApps directory is vulnerable to symbolic link attack, aka 'Microsoft Windows Store Installer Elevation of Privilege Vulnerability'.
CVE-2020-24562 2 Microsoft, Trendmicro 2 Windows, Officescan 2021-07-21 7.2 HIGH 7.8 HIGH
A vulnerability in Trend Micro OfficeScan XG SP1 on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This CVE is similar, but not identical to CVE-2020-24556.
CVE-2020-14990 1 Iobit 1 Advanced Systemcare 2021-07-21 3.6 LOW 7.1 HIGH
IOBit Advanced SystemCare Free 13.5.0.263 allows local users to gain privileges for file deletion by manipulating the Clean & Optimize feature with an NTFS junction and an Object Manager symbolic link.
CVE-2020-1885 1 Oculus 1 Desktop 2021-07-21 4.6 MEDIUM 7.8 HIGH
Writing to an unprivileged file from a privileged OVRRedir.exe process in Oculus Desktop before 1.44.0.32849 on Windows allows local users to write to arbitrary files and consequently gain privileges via vectors involving a hard link to a log file.
CVE-2019-12779 1 Clusterlabs 1 Libqb 2021-07-03 6.6 MEDIUM 7.1 HIGH
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
CVE-2021-32557 1 Canonical 1 Apport 2021-06-23 3.6 LOW 7.1 HIGH
It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
CVE-2021-0094 1 Intel 1 Driver \& Support Assistant 2021-06-23 4.6 MEDIUM 7.8 HIGH
Improper link resolution before file access in Intel(R) DSA before version 20.11.50.9 may allow an authenticated user to potentially enable an escalation of privilege via local access.
CVE-2021-32555 1 Canonical 1 Ubuntu Linux 2021-06-16 2.1 LOW 5.5 MEDIUM
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
CVE-2021-32554 1 Canonical 1 Ubuntu Linux 2021-06-16 2.1 LOW 5.5 MEDIUM
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
CVE-2021-32553 2 Canonical, Oracle 2 Ubuntu Linux, Openjdk 2021-06-16 2.1 LOW 5.5 MEDIUM
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
CVE-2021-32552 1 Canonical 1 Ubuntu Linux 2021-06-15 2.1 LOW 5.5 MEDIUM
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32551 1 Canonical 1 Ubuntu Linux 2021-06-15 2.1 LOW 5.5 MEDIUM
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.
CVE-2021-32550 1 Canonical 1 Ubuntu Linux 2021-06-15 2.1 LOW 5.5 MEDIUM
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.