Vulnerabilities (CVE)

Filtered by CWE-59
Total 1309 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-24103 1 Apple 1 Macos 2025-03-18 N/A 5.5 MEDIUM
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access protected user data.
CVE-2024-44178 1 Apple 1 Macos 2025-03-15 N/A 5.5 MEDIUM
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to modify protected parts of the file system.
CVE-2024-36305 1 Trendmicro 1 Apex One 2025-03-14 N/A 7.8 HIGH
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2023-42942 1 Apple 6 Ipad Os, Ipados, Iphone Os and 3 more 2025-03-14 N/A 7.8 HIGH
This issue was addressed with improved handling of symlinks. This issue is fixed in watchOS 10.1, macOS Sonoma 14.1, tvOS 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, macOS Ventura 13.6.1. A malicious app may be able to gain root privileges.
CVE-2024-27885 1 Apple 1 Macos 2025-03-13 N/A 6.3 MEDIUM
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. An app may be able to modify protected parts of the file system.
CVE-2022-30333 4 Debian, Linux, Opengroup and 1 more 4 Debian Linux, Linux Kernel, Unix and 1 more 2025-03-13 5.0 MEDIUM 7.5 HIGH
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CVE-2023-25148 2 Microsoft, Trendmicro 2 Windows, Apex One 2025-03-05 N/A 7.8 HIGH
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to exploit the vulnerability by changing a specific file into a pseudo-symlink, allowing privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2023-25146 2 Microsoft, Trendmicro 2 Windows, Apex One 2025-03-05 N/A 7.8 HIGH
A security agent link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to quarantine a file, delete the original folder and replace with a junction to an arbitrary location, ultimately leading to an arbitrary file dropped to an arbitrary location. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2023-25145 2 Microsoft, Trendmicro 2 Windows, Apex One 2025-03-05 N/A 7.8 HIGH
A link following vulnerability in the scanning function of Trend Micro Apex One agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2024-45418 1 Zoom 4 Meeting Software Development Kit, Rooms, Video Software Development Kit and 1 more 2025-03-04 N/A 5.4 MEDIUM
Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access.
CVE-2024-0068 2 Apple, Hypr 2 Macos, Workforce Access 2025-03-04 N/A 5.5 MEDIUM
Improper Link Resolution Before File Access ('Link Following') vulnerability in HYPR Workforce Access on MacOS allows File Manipulation.This issue affects Workforce Access: before 8.7.1.
CVE-2023-24577 1 Mcafee 1 Total Protection 2025-03-03 N/A 5.5 MEDIUM
McAfee Total Protection prior to 16.0.50 allows attackers to elevate user privileges due to Improper Link Resolution via registry keys. This could enable a user with lower privileges to execute unauthorized tasks.
CVE-2025-25185 2025-03-03 N/A 7.5 HIGH
GPT Academic provides interactive interfaces for large language models. In 3.91 and earlier, GPT Academic does not properly account for soft links. An attacker can create a malicious file as a soft link pointing to a target file, then package this soft link file into a tar.gz file and upload it. Subsequently, when accessing the decompressed file from the server, the soft link will point to the target file on the victim server. The vulnerability allows attackers to read all files on the server.
CVE-2023-33148 1 Microsoft 2 365 Apps, Office 2025-02-28 N/A 7.8 HIGH
Microsoft Office Elevation of Privilege Vulnerability
CVE-2023-27850 1 Netgear 2 Rax30, Rax30 Firmware 2025-02-28 N/A 6.8 MEDIUM
NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that allows users with access to this feature to access arbitrary files on the device.
CVE-2025-21322 1 Microsoft 1 Pc Manager 2025-02-28 N/A 7.8 HIGH
Microsoft PC Manager Elevation of Privilege Vulnerability
CVE-2025-21347 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-02-28 N/A 6.0 MEDIUM
Windows Deployment Services Denial of Service Vulnerability
CVE-2025-21373 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-02-26 N/A 7.8 HIGH
Windows Installer Elevation of Privilege Vulnerability
CVE-2022-21999 1 Microsoft 17 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 14 more 2025-02-24 4.6 MEDIUM 7.8 HIGH
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2021-41379 1 Microsoft 18 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 15 more 2025-02-24 4.6 MEDIUM 5.5 MEDIUM
Windows Installer Elevation of Privilege Vulnerability