Show filters
266 Total Results
Displaying 41-50 of 266
Sort by:
Attacker Value
Unknown
CVE-2021-21594
Disclosure Date: August 10, 2021 (last updated February 23, 2025)
Dell PowerScale OneFS versions 8.2.2 - 9.1.0.x contain a use of get request method with sensitive query strings vulnerability. It can lead to potential disclosure of sensitive data. Dell recommends upgrading at your earliest opportunity.
0
Attacker Value
Unknown
CVE-2021-21740
Disclosure Date: August 09, 2021 (last updated February 23, 2025)
There is an information leak vulnerability in the digital media player (DMS) of ZTE's residential gateway product. The attacker could insert the USB disk with the symbolic link into the residential gateway, and access unauthorized directory information through the symbolic link, causing information leak.
0
Attacker Value
Unknown
CVE-2021-32803
Disclosure Date: August 03, 2021 (last updated February 23, 2025)
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replac…
0
Attacker Value
Unknown
CVE-2021-36983
Disclosure Date: July 30, 2021 (last updated February 23, 2025)
replay-sorcery-kms in Replay Sorcery 0.6.0 allows a local attacker to gain root privileges via a symlink attack on /tmp/replay-sorcery or /tmp/replay-sorcery/device.sock.
0
Attacker Value
Unknown
CVE-2021-32610
Disclosure Date: July 30, 2021 (last updated February 23, 2025)
In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193.
0
Attacker Value
Unknown
CVE-2021-1092
Disclosure Date: July 22, 2021 (last updated February 23, 2025)
NVIDIA GPU Display Driver for Windows contains a vulnerability in the NVIDIA Control Panel application where it is susceptible to a Windows file system symbolic link attack where an unprivileged attacker can cause the applications to overwrite privileged files, resulting in potential denial of service or data loss.
0
Attacker Value
Unknown
CVE-2021-1091
Disclosure Date: July 22, 2021 (last updated February 23, 2025)
NVIDIA GPU Display driver for Windows contains a vulnerability where an unprivileged user can create a file hard link that causes the driver to overwrite a file that requires elevated privilege to modify, which could lead to data loss or denial of service.
0
Attacker Value
Unknown
CVE-2021-26089
Disclosure Date: July 12, 2021 (last updated February 23, 2025)
An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase.
0
Attacker Value
Unknown
CVE-2021-32000
Disclosure Date: July 08, 2021 (last updated February 23, 2025)
A UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allows local attackers to delete arbitrary files. This issue affects: SUSE Linux Enterprise Server 12 SP3 clone-master-clean-up version 1.6-4.6.1 and prior versions. SUSE Linux Enterprise Server 15 SP1 clone-master-clean-up version 1.6-3.9.1 and prior versions. openSUSE Factory clone-master-clean-up version 1.6-1.4 and prior versions.
0
Attacker Value
Unknown
CVE-2021-32518
Disclosure Date: July 07, 2021 (last updated February 23, 2025)
A vulnerability in share_link in QSAN Storage Manager allows remote attackers to create a symbolic link then access arbitrary files. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
0