Vulnerabilities (CVE)

Filtered by CWE-59
Total 1391 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2004-0689 2 Debian, Kde 2 Debian Linux, Kde 2025-04-03 4.6 MEDIUM 7.1 HIGH
KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow local users to create or truncate arbitrary files.
CVE-2002-0824 1 Freebsd 1 Point-to-point Protocol Daemon 2025-04-03 6.9 MEDIUM N/A
BSD pppd allows local users to change the permissions of arbitrary files via a symlink attack on a file that is specified as a tty device.
CVE-2002-2323 1 Sun 1 Solaris Pc Netlink 2025-04-03 5.0 MEDIUM 7.5 HIGH
Sun PC NetLink 1.0 through 1.2 does not properly set the access control list (ACL) for files and directories that use symbolic links and have been restored from backup, which could allow local or remote attackers to bypass intended access restrictions.
CVE-2003-0578 1 Ibm 1 U2 Universe 2025-04-03 4.6 MEDIUM 7.8 HIGH
cci_dir in IBM U2 UniVerse 10.0.0.9 and earlier creates hard links and unlinks files as root, which allows local users to gain privileges by deleting and overwriting arbitrary files.
CVE-2005-3011 1 Gnu 1 Texinfo 2025-04-03 1.2 LOW N/A
The sort_offline function for texindex in texinfo 4.8 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files.
CVE-2002-2382 1 Cvsup 1 Cvsup 2025-04-03 7.2 HIGH N/A
cvsupd.sh in CVSup 1.2 allows local users to overwrite arbitrary files and gain privileges via a symlink attack on /var/tmp/cvsupd.out.
CVE-2004-2473 1 Wmfrog 1 Wmfrog 2025-04-03 1.2 LOW N/A
wmFrog weather monitor 0.1.6 and other versions before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
CVE-2006-1247 1 Ibm 1 Aix 2025-04-03 3.3 LOW N/A
rm_mlcache_file in bos.rte.install in AIX 5.1.0 through 5.3.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
CVE-2005-3349 1 Gnu 1 Gnump3d 2025-04-03 1.9 LOW N/A
GNU Gnump3d before 2.9.8 allows local users to modify or delete arbitrary files via a symlink attack on the index.lok temporary file.
CVE-2000-0342 1 Qualcomm 1 Eudora 2025-04-03 5.0 MEDIUM 7.5 HIGH
Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
CVE-2003-1492 2 Mozilla, Netscape 2 Firefox, Navigator 2025-04-03 5.0 MEDIUM N/A
Netscape Navigator 7.0.2 and Mozilla allows remote attackers to access cookie information in a different domain via an HTTP request for a domain with an extra . (dot) at the end.
CVE-2002-2374 1 Sun 1 Patchpro 2025-04-03 10.0 HIGH N/A
Unspecified vulnerability in pprosetup in Sun PatchPro 2.0 has unknown impact and attack vectors related to "unsafe use of temporary files."
CVE-2003-0844 1 Schroepl 1 Mod Gzip 2025-04-03 2.1 LOW 7.1 HIGH
mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode without the Apache log, allows local users to overwrite arbitrary files via (1) a symlink attack on predictable temporary filenames on Unix systems, or (2) an NTFS hard link on Windows systems when the "Strengthen default permissions of internal system objects" policy is not enabled.
CVE-2020-36657 1 Uptimed Project 1 Uptimed 2025-04-01 N/A 7.8 HIGH
uptimed before 0.4.6-r1 on Gentoo allows local users (with access to the uptimed user account) to gain root privileges by creating a hard link within the /var/spool/uptimed directory, because there is an unsafe chown -R call.
CVE-2025-30371 2025-03-28 N/A N/A
Metabase is a business intelligence and embedded analytics tool. Versions prior to v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8 are vulnerable to circumvention of local link access protection in GeoJson endpoint. Self hosted Metabase instances that are using the GeoJson feature could be potentially impacted if their Metabase is colocated with other unsecured resources. This is fixed in v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8. Migrating to Metabase Cloud or redeploying Metabase in a dedicated subnet with strict outbound port controls is an available workaround.
CVE-2024-36306 1 Trendmicro 1 Apex One 2025-03-27 N/A 6.1 MEDIUM
A link following vulnerability in the Trend Micro Apex One and Apex One as a Service Damage Cleanup Engine could allow a local attacker to create a denial-of-service condition on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2023-23558 1 Eternal Terminal Project 1 Eternal Terminal 2025-03-19 N/A 6.3 MEDIUM
In Eternal Terminal 6.2.1, TelemetryService uses fixed paths in /tmp. For example, a local attacker can create /tmp/.sentry-native-etserver with mode 0777 before the etserver process is started. The attacker can choose to read sensitive information from that file, or modify the information in that file.
CVE-2024-36305 1 Trendmicro 1 Apex One 2025-03-14 N/A 7.8 HIGH
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2024-27885 1 Apple 1 Macos 2025-03-13 N/A 6.3 MEDIUM
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. An app may be able to modify protected parts of the file system.
CVE-2025-25185 1 Binary-husky 1 Gpt Academic 2025-03-07 N/A 7.5 HIGH
GPT Academic provides interactive interfaces for large language models. In 3.91 and earlier, GPT Academic does not properly account for soft links. An attacker can create a malicious file as a soft link pointing to a target file, then package this soft link file into a tar.gz file and upload it. Subsequently, when accessing the decompressed file from the server, the soft link will point to the target file on the victim server. The vulnerability allows attackers to read all files on the server.