Show filters
236 Total Results
Displaying 21-30 of 236
Sort by:
Attacker Value
Unknown
CVE-2021-32509
Disclosure Date: July 07, 2021 (last updated February 23, 2025)
Absolute Path Traversal vulnerability in FileviewDoc in QSAN Storage Manager allows remote authenticated attackers access arbitrary files by injecting the Symbolic Link following the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
0
Attacker Value
Unknown
CVE-2021-32508
Disclosure Date: July 07, 2021 (last updated February 23, 2025)
Absolute Path Traversal vulnerability in FileStreaming in QSAN Storage Manager allows remote authenticated attackers access arbitrary files by injecting the Symbolic Link following the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
0
Attacker Value
Unknown
CVE-2020-4885
Disclosure Date: June 23, 2021 (last updated February 22, 2025)
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow a local user to access and change the configuration of Db2 due to a race condition of a symbolic link,. IBM X-Force ID: 190909.
0
Attacker Value
Unknown
CVE-2021-0094
Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Improper link resolution before file access in Intel(R) DSA before version 20.11.50.9 may allow an authenticated user to potentially enable an escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2020-15076
Disclosure Date: May 26, 2021 (last updated February 22, 2025)
Private Tunnel installer for macOS version 3.0.1 and older versions may corrupt system critical files it should not have access via symlinks in /tmp.
0
Attacker Value
Unknown
CVE-2020-9452
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API.
0
Attacker Value
Unknown
CVE-2021-32550
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32557
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
0
Attacker Value
Unknown
CVE-2021-32548
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32555
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
0