Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-59
Total 925 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-12571 2 Apple, Londontrustmedia 2 Macos, Private Internet Access Vpn Client 2021-09-08 6.6 MEDIUM 7.1 HIGH
A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v0.9.8 beta (build 02099) for macOS could allow an authenticated, local attacker to overwrite arbitrary files. When the client initiates a connection, the XML /tmp/pia-watcher.plist file is created. If the file exists, it will be truncated and the contents completely overwritten. This file is removed on disconnect. An unprivileged user can create a hard or soft link to arbitrary files owned by any user on the system, including root. This creates a denial of service condition and possible data loss if leveraged by a malicious local user.
CVE-2014-3977 1 Ibm 2 Aix, Vios 2021-08-31 6.9 MEDIUM N/A
libodm.a in IBM AIX 6.1 and 7.1, and VIOS 2.2.x, allows local users to overwrite arbitrary files via a symlink attack on a temporary file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2179.
CVE-2021-21740 1 Zte 2 Zxhn H2640, Zxhn H2640 Firmware 2021-08-17 2.1 LOW 2.4 LOW
There is an information leak vulnerability in the digital media player (DMS) of ZTE's residential gateway product. The attacker could insert the USB disk with the symbolic link into the residential gateway, and access unauthorized directory information through the symbolic link, causing information leak.
CVE-2021-38570 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2021-08-12 6.4 MEDIUM 9.1 CRITICAL
An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows attackers to delete arbitrary files (during uninstallation) via a symlink.
CVE-2021-36983 1 Replaysorcery Project 1 Replaysorcery 2021-08-06 7.2 HIGH 7.8 HIGH
replay-sorcery-kms in Replay Sorcery 0.6.0 allows a local attacker to gain root privileges via a symlink attack on /tmp/replay-sorcery or /tmp/replay-sorcery/device.sock.
CVE-2021-1091 1 Nvidia 1 Gpu Display Driver 2021-07-30 3.6 LOW 7.1 HIGH
NVIDIA GPU Display driver for Windows contains a vulnerability where an unprivileged user can create a file hard link that causes the driver to overwrite a file that requires elevated privilege to modify, which could lead to data loss or denial of service.
CVE-1999-0981 1 Microsoft 1 Internet Explorer 2021-07-23 5.1 MEDIUM N/A
Internet Explorer 5.01 and earlier allows a remote attacker to create a reference to a client window and use a server-side redirect to access local files via that window, aka "Server-side Page Reference Redirect."
CVE-2019-19693 2 Microsoft, Trendmicro 5 Windows, Antivirus\+ Security 2020, Internet Security 2020 and 2 more 2021-07-21 3.6 LOW 7.1 HIGH
The Trend Micro Security 2020 consumer family of products contains a vulnerability that could allow a local attacker to disclose sensitive information or to create a denial-of-service condition on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2019-1270 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2021-07-21 3.6 LOW 5.5 MEDIUM
An elevation of privilege vulnerability exists in Windows store installer where WindowsApps directory is vulnerable to symbolic link attack, aka 'Microsoft Windows Store Installer Elevation of Privilege Vulnerability'.
CVE-2020-7653 1 Synk 1 Broker 2021-07-21 4.0 MEDIUM 6.5 MEDIUM
All versions of snyk-broker before 4.80.0 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users with access to Snyk's internal network by creating symlinks to match whitelisted paths.
CVE-2019-1267 1 Microsoft 7 Windows 10, Windows 7, Windows 8.1 and 4 more 2021-07-21 7.2 HIGH 7.8 HIGH
An elevation of privilege vulnerability exists in Microsoft Compatibility Appraiser where a configuration file, with local privileges, is vulnerable to symbolic link and hard link attacks, aka 'Microsoft Compatibility Appraiser Elevation of Privilege Vulnerability'.
CVE-2020-27172 1 Gdatasoftware 1 G Data 2021-07-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in G-Data before 25.5.9.25 using Symbolic links, it is possible to abuse the infected-file restore mechanism to achieve arbitrary write that leads to elevation of privileges.
CVE-2020-27643 1 1e 1 Client 2021-07-21 4.0 MEDIUM 6.5 MEDIUM
The %PROGRAMDATA%\1E\Client directory in 1E Client 5.0.0.745 and 4.1.0.267 allows remote authenticated users and local users to create and modify files in protected directories (where they would not normally have access to create or modify files) via the creation of a junction point to a system directory. This leads to partial privilege escalation.
CVE-2020-25776 1 Trendmicro 1 Antivirus 2021-07-21 7.2 HIGH 7.8 HIGH
Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a symbolic link privilege escalation attack where an attacker could exploit a critical file on the system to escalate their privileges. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2020-24562 2 Microsoft, Trendmicro 2 Windows, Officescan 2021-07-21 7.2 HIGH 7.8 HIGH
A vulnerability in Trend Micro OfficeScan XG SP1 on Microsoft Windows may allow an attacker to create a hard link to any file on the system, which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This CVE is similar, but not identical to CVE-2020-24556.
CVE-2020-11446 1 Eset 8 Antivirus And Antispyware, Endpoint Antivirus, Endpoint Security and 5 more 2021-07-21 4.6 MEDIUM 7.8 HIGH
ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation.
CVE-2020-7221 1 Mariadb 1 Mariadb 2021-07-21 7.2 HIGH 7.8 HIGH
mysql_install_db in MariaDB 10.4.7 through 10.4.11 allows privilege escalation from the mysql user account to root because chown and chmod are performed unsafely, as demonstrated by a symlink attack on a chmod 04755 of auth_pam_tool_dir/auth_pam_tool. NOTE: this does not affect the Oracle MySQL product, which implements mysql_install_db differently.
CVE-2020-24955 1 Superantispyware 1 Professional X 2021-07-21 7.2 HIGH 7.8 HIGH
SUPERAntiSyware Professional X Trial 10.0.1206 is vulnerable to local privilege escalation because it allows unprivileged users to restore a malicious DLL from quarantine into the system32 folder via an NTFS directory junction, as demonstrated by a crafted ualapi.dll file that is detected as malware.
CVE-2020-6546 3 Debian, Fedoraproject, Google 3 Debian Linux, Fedora, Chrome 2021-07-21 4.6 MEDIUM 7.8 HIGH
Inappropriate implementation in installer in Google Chrome prior to 84.0.4147.125 allowed a local attacker to potentially elevate privilege via a crafted filesystem.
CVE-2020-8948 1 Sierrawireless 1 Mobile Broadband Driver Package 2021-07-21 7.2 HIGH 7.8 HIGH
The Sierra Wireless Windows Mobile Broadband Driver Packages (MBDP) before build 5043 allows an unprivileged user to overwrite arbitrary files in arbitrary folders using hard links. An unprivileged user could leverage this vulnerability to execute arbitrary code with system privileges.