Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:CERT C Secure Coding Standard (2008) Appendix - POSIX (POS)
Category ID:748
Vulnerability Mapping:Prohibited
Status:Obsolete
DetailsContent HistoryObserved CVE ExamplesReports
2179Vulnerabilities found

CVE-2019-13226
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 15.42%
||
7 Day CHG~0.00%
Published-04 Jul, 2019 | 11:32
Updated-04 Aug, 2024 | 23:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

deepin-clone before 1.1.3 uses a predictable path /tmp/.deepin-clone/mount/<block-dev-basename> in the Helper::temporaryMountDevice() function to temporarily mount a file system as root. An unprivileged user can prepare a symlink at this location to have the file system mounted in an arbitrary location. By winning a race condition, the attacker can also enter the mount point, thereby preventing a subsequent unmount of the file system.

Action-Not Available
Vendor-deepinn/aFedora Project
Product-deepin-clonefedoran/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-13173
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.43% / 62.28%
||
7 Day CHG~0.00%
Published-02 Jul, 2019 | 19:26
Updated-04 Aug, 2024 | 23:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.

Action-Not Available
Vendor-fstream_projectn/a
Product-fstreamn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-10072
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-33.40% / 96.85%
||
7 Day CHG-38.75%
Published-21 Jun, 2019 | 17:56
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-tomcatApache Tomcat
CWE ID-CWE-667
Improper Locking
CVE-2019-2025
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.20% / 41.85%
||
7 Day CHG-0.05%
Published-19 Jun, 2019 | 20:07
Updated-04 Aug, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In binder_thread_read of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-116855682References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-667
Improper Locking
CVE-2019-1053
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.25% / 47.74%
||
7 Day CHG~0.00%
Published-12 Jun, 2019 | 13:49
Updated-20 May, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Shell Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when the Windows Shell fails to validate folder shortcuts. An attacker who successfully exploited the vulnerability could elevate privileges by escaping a sandbox. To exploit this vulnerability, an attacker would require unprivileged execution on the victim system. The security update addresses the vulnerability by correctly validating folder shortcuts.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2012windows_server_2016windows_7windows_rt_8.1windows_server_2019windows_8.1windows_server_2008windows_10Windows Server 2008 R2 Systems Service Pack 1Windows 10 Version 1803Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server, version 1803 (Server Core Installation)Windows Server 2019Windows Server 2012 R2Windows Server 2016Windows Server 2016 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows 7 Service Pack 1Windows Server 2008 Service Pack 2Windows Server 2019 (Server Core installation)Windows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows 10 Version 1607Windows Server 2008 Service Pack 2Windows Server, version 1903 (Server Core installation)Windows 10 Version 1903 for x64-based SystemsWindows 10 Version 1507Windows Server 2012 (Server Core installation)Windows 10 Version 1709Windows 8.1Windows Server 2008 R2 Service Pack 1Windows Server 2012Windows 10 Version 1703Windows 7Windows 10 Version 1809
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-1069
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-30.46% / 96.62%
||
7 Day CHG-0.54%
Published-12 Jun, 2019 | 13:49
Updated-29 Oct, 2025 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-05||Apply updates per vendor instructions.
Task Scheduler Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1709windows_10_1507windows_server_1803windows_10_1903windows_10_1703windows_10_1607windows_10_1809windows_server_2019windows_server_1903windows_server_2016windows_10_1803Windows 10 Version 1803Windows Server 2016 (Server Core installation)Windows Server, version 1803 (Server Core Installation)Windows Server 2019 (Server Core installation)Windows 10 Version 1703Windows 10 Version 1903 for x64-based SystemsWindows Server 2019Windows 10 Version 1507Windows 10 Version 1607Windows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1809Windows Server, version 1903 (Server Core installation)Windows 10 Version 1709 for 32-bit SystemsWindows Server 2016Windows 10 Version 1709windows_server_2019windows_10windows_server_2016Task Scheduler
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-1064
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-11.34% / 93.45%
||
7 Day CHG~0.00%
Published-12 Jun, 2019 | 13:49
Updated-29 Oct, 2025 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-05||Apply updates per vendor instructions.
Windows Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1709windows_server_1803windows_10_1903windows_10_1703windows_10_1607windows_server_1709windows_10_1809windows_server_2019windows_server_1903windows_server_2016windows_10_1803Windows 10 Version 1803Windows Server 2019Windows 10 Version 1607Windows Server 2016Windows Server 2016 (Server Core installation)Windows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1809Windows Server, version 1803 (Server Core Installation)Windows Server 2019 (Server Core installation)Windows 10 Version 1703Windows Server, version 1903 (Server Core installation)Windows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1903 for x64-based SystemsWindows 10 Version 1709Windows
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-0986
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-6.3||MEDIUM
EPSS-3.67% / 87.73%
||
7 Day CHG~0.00%
Published-12 Jun, 2019 | 13:49
Updated-20 May, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows User Profile Service Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete files or folders of their choosing. The security update addresses the vulnerability by correcting how the Windows User Profile Service handles symlinks.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2012windows_server_2016windows_7windows_rt_8.1windows_server_2019windows_8.1windows_server_2008windows_10Windows Server 2008 R2 Systems Service Pack 1Windows 10 Version 1803Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server, version 1803 (Server Core Installation)Windows Server 2019Windows Server 2012 R2Windows Server 2016Windows Server 2016 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows 7 Service Pack 1Windows Server 2008 Service Pack 2Windows Server 2019 (Server Core installation)Windows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows 10 Version 1607Windows Server 2008 Service Pack 2Windows Server, version 1903 (Server Core installation)Windows 10 Version 1903 for x64-based SystemsWindows 10 Version 1507Windows Server 2012 (Server Core installation)Windows 10 Version 1709Windows 8.1Windows Server 2008 R2 Service Pack 1Windows Server 2012Windows 10 Version 1703Windows 7Windows 10 Version 1809
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-12749
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.03% / 7.52%
||
7 Day CHG-0.00%
Published-11 Jun, 2019 | 16:11
Updated-13 Feb, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

Action-Not Available
Vendor-n/afreedesktop.orgCanonical Ltd.
Product-dbusubuntu_linuxn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-12779
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.03% / 9.17%
||
7 Day CHG~0.00%
Published-07 Jun, 2019 | 19:44
Updated-04 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.

Action-Not Available
Vendor-clusterlabsn/a
Product-libqbn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-12209
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.63% / 69.99%
||
7 Day CHG~0.00%
Published-04 Jun, 2019 | 20:26
Updated-04 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information.

Action-Not Available
Vendor-yubicon/a
Product-pam-u2fn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-3567
Assigner-Meta Platforms, Inc.
ShareView Details
Assigner-Meta Platforms, Inc.
CVSS Score-8.1||HIGH
EPSS-0.43% / 62.43%
||
7 Day CHG~0.00%
Published-03 Jun, 2019 | 18:22
Updated-04 Aug, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load said malicious executable with SYSTEM permissions. The solution is to migrate installations to the 'Program Files' directory on Windows which restricts unprivileged write access. This issue affects osquery prior to v3.4.0.

Action-Not Available
Vendor-The Linux FoundationFacebook
Product-osqueryosquery
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-6322
Assigner-HP Inc.
ShareView Details
Assigner-HP Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.31% / 54.22%
||
7 Day CHG~0.00%
Published-29 May, 2019 | 19:56
Updated-04 Aug, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP has identified a security vulnerability with some versions of Workstation BIOS (UEFI Firmware) where the runtime BIOS code could be tampered with if the TPM is disabled. This vulnerability relates to Workstations whose TPM is enabled by default.

Action-Not Available
Vendor-n/aHP Inc.
Product-z6_g4_workstationz6_g4_workstation_firmwarez8_g4_workstationz4_g4_core-x_workstationz4_g4_core-x_workstation_firmwarez8_g4_workstation_firmwarez4_g4_workstationz4_g4_workstation_firmwareHP Z4 G4 Workstation (Xeon W)HP Z4 G4 Workstation (Xeon W) (Linux)HP Z8 G4 WorkstationHP Z8 G4 Workstation (Linux)HP Z6 G4 Workstation (Linux)HP Z4 G4 Core-X WorkstationHP Z6 G4 WorkstationHP Z4 G4 Core-X Workstation (Linux)
CWE ID-CWE-667
Improper Locking
CVE-2019-6321
Assigner-HP Inc.
ShareView Details
Assigner-HP Inc.
CVSS Score-7.2||HIGH
EPSS-0.36% / 57.71%
||
7 Day CHG~0.00%
Published-29 May, 2019 | 19:55
Updated-04 Aug, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP has identified a security vulnerability with some versions of Workstation BIOS (UEFI Firmware) where the runtime BIOS code could be tampered with if the TPM is disabled. This vulnerability relates to Workstations whose TPM is disabled by default.

Action-Not Available
Vendor-n/aHP Inc.
Product-z6_g4_workstationz6_g4_workstation_firmwarez8_g4_workstationz4_g4_core-x_workstationz4_g4_core-x_workstation_firmwarez8_g4_workstation_firmwarez4_g4_workstationz4_g4_workstation_firmwareHP Z4 G4 Workstation (Xeon W)HP Z4 G4 Workstation (Xeon W) (Linux)HP Z8 G4 WorkstationHP Z8 G4 Workstation (Linux)HP Z6 G4 Workstation (Linux)HP Z4 G4 Core-X WorkstationHP Z6 G4 WorkstationHP Z4 G4 Core-X Workstation (Linux)
CWE ID-CWE-667
Improper Locking
CVE-2019-9949
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-2.50% / 85.16%
||
7 Day CHG~0.00%
Published-23 May, 2019 | 13:22
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Western Digital My Cloud Cloud, Mirror Gen2, EX2 Ultra, EX2100, EX4100, DL2100, DL4100, PR2100 and PR4100 before firmware 2.31.183 are affected by a code execution (as root, starting from a low-privilege user session) vulnerability. The cgi-bin/webfile_mgr.cgi file allows arbitrary file write by abusing symlinks. Specifically, this occurs by uploading a tar archive that contains a symbolic link, then uploading another archive that writes a file to the link using the "cgi_untar" command. Other commands might also be susceptible. Code can be executed because the "name" parameter passed to the cgi_unzip command is not sanitized.

Action-Not Available
Vendor-n/aWestern Digital Corp.
Product-my_cloud_firmwaremy_cloud_ex4100_firmwaremy_cloud_mirror_gen2my_cloud_pr4100_firmwaremy_cloud_mirror_gen2_firmwaremy_cloud_dl2100_firmwaremy_cloud_pr4100my_cloud_dl2100my_cloudmy_cloud_ex4100my_cloud_ex2_ultramy_cloud_pr2100my_cloud_ex2100my_cloud_dl4100my_cloud_ex2100_firmwaremy_cloud_dl4100_firmwaremy_cloud_pr2100_firmwaremy_cloud_ex2_ultra_firmwaren/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-0086
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.25%
||
7 Day CHG-0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) Converged Security & Management Engine (CSME) Dynamic Application Loader, Intel (R) Trusted Execution Engine Interface (TXE)
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-0936
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.42% / 61.41%
||
7 Day CHG~0.00%
Published-16 May, 2019 | 18:17
Updated-04 Aug, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability exists in Microsoft Windows when Windows fails to properly handle certain symbolic links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0734.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10windows_server_2019windows_server_2008WindowsWindows ServerWindows 10 Version 1903 for x64-based SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1903 for 32-bit SystemsWindows Server, version 1903 (Server Core installation)
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-1732
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.29% / 52.30%
||
7 Day CHG+0.07%
Published-15 May, 2019 | 16:50
Updated-20 Nov, 2024 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco NX-OS Software Remote Package Manager Command Injection Vulnerability

A vulnerability in the Remote Package Manager (RPM) subsystem of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to leverage a time-of-check, time-of-use (TOCTOU) race condition to corrupt local variables, which could lead to arbitrary command injection. The vulnerability is due to the lack of a proper locking mechanism on critical variables that need to stay static until used. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a set of RPM-related CLI commands. A successful exploit could allow the attacker to perform arbitrary command injection. The attacker would need administrator credentials for the targeted device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_3500nexus_3100vnexus_9200nx-osnexus_3200nexus_3400nexus_3100nexus_9000nexus_3548-xnexus_9500nexus_3100-znx_osnexus_3524-xlnexus_9300nexus_3000nexus_3548-xlnexus_3600nexus_3524-xCisco NX-OS Software
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-667
Improper Locking
CVE-2019-1649
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.34% / 56.50%
||
7 Day CHG-0.01%
Published-13 May, 2019 | 19:10
Updated-20 Nov, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Secure Boot Hardware Tampering Vulnerability

A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_9300nim-4e\/mfirepower_4150nim-4bri-nt\/teasr-920-12sz-im-ccnx-osa900-rsp3c-400\/wic3000-k9_firmwareasr-920-12cz-aintegrated_services_router_4400_firmware1240_connected_grid_routerncs-55a2-mod-se-h-snim-2foxc9300-24ufirepower_9000_firmware4331_integrated_services_routerasr1000-6tgenim-4fxsc6800-sup6t-xln77-sup3enc55-5504-fcnim-2fxs\/4fxoncs-55a1-36h-sc6800-8p10g-xlc6824-x-le-40gcatalyst_9800-80_wireless_controllernim-2ge-cu-sfpasr-920-4sz-aasr-920-12sz-da99-32x100ge-cma99-rp3-trc9500-24qsm-x-1t3\/e3_firmwarefirepower_4140n9k-sup-b\+nim-4fxoasr_1000_seriesasa_5506-xn9k-c93108tc-fxn7k-m348xp-25lasr-920-24sz-mncs2k-mr-mxp-k9_firmwareasr_1001_firmwareencs_5100sm-x-pvdm-3000nim-2mft-t1\/e1network_convergence_system_1002ncs-55a1-36h-sec9500-32csm-x-1t3\/e3n3k-c3264c-ec9300-24tons_15454_mstp_firmwarencs-5502cbr-ccap-lc-40g-rc6840-x-le-40ga9k-rsp5-senim-2fxsnim-1ce1t1-princ55-24h12f-seasr-920-10sz-pdasr-920-4sz-dintegrated_services_router_4200_firmwareons_15454_mstpasr-920-12cz-dnetwork_convergence_system_5001n9k-c93180yc-fxfirepower_4120c9300-48tn9k-c9348gc-fxpcbr-lc-8d31-16u31a900-rsp2a-64c9500-40xasr-920-24tz-imnim-8ce1t1-priencs_5400_firmwaren77-m312cq-26lncs2k-mr-mxp-k915454-m-wse-k9_firmwarecatalyst_9600_supervisor_engine-1cbr-8_converged_broadband_routerfirepower_2120c9300-48unn9k-c93240yc-fx2nc55-36x100g-a-sen9k-c93108tc-exn3k-c3132c-za99-32x100ge-trc9300-24uxc9300-48unc55-mod-a-snim-8mft-t1\/e11120_connected_grid_routerasr-920-24tz-masr-920-12sz-aic3000-k9asr1000-mip100asa_5516-xa9k-rsp5-trindustrial_security_appliances_3000_firmwarea900-rsp2a-128c6816-x-lefirepower_2130nim-2fxspfirepower_4110nim-2bri-nt\/tea9k-16x100ge-trc9500-12qfirepower_2110nc55-36x100g-sc6800-32p10g-xlintegrated_services_router_4300_firmwarea99-rp3-secatalyst_9800-40_wireless_controllerasr1000-2t\+20x1gencs-5501sm-x-pvdm-1000n9k-c93180yc-exncs-5501-sec9500-16xc6800-16p10g-xlc6800-8p40g-xla9k-16x100ge-cmnim-1mft-t1\/e1809_industrial_integrated_services_routersnim-4mft-t1\/e115454-m-wse-k9nim-4fxspncs-55a2-mod-se-s44461_integrated_services_routerasr1000-rp34221_integrated_services_routernc55-6x200-dwdm-sasr1000-esp200c9300-48pncs-55a2-mod-sn3k-c31108pc-vasr_1001-hxc6832-x-lesupervisor_b\+_firmwaresm-x-pvdm-500network_convergence_system_5002c9300-24p4451-x_integrated_services_routerc9500-32qcc9300-48uxm829_industrial_integrated_services_routersds-x9334-k9ds-x9648-1536k9firepower_4000_firmwareasr_1002-hxn9k-c92300ycencs_5400catalyst_9800-40_wireless_controller_firmwaresupervisor_a\+_firmwarencs-55a2-mod-hd-siosasr_1000-esp100nc55-5516-fcios_xrnim-1ge-cu-sfpa99-16x100ge-x-sen3k-c31108tc-vsm-x-pvdm-2000a900-rsp3c-200ncs-55a2-mod-hx-s4321_integrated_services_routern7k-m324fq-25lnim-2ce1t1-priencs_5100_firmware4431_integrated_services_routernim-2fxs\/4fxopasa_5506h-xindustrial_security_appliances_3000n77-m348xp-23lfirepower_2100_firmwareios_xencs-5502-seasa_5500_firmwarencs-55a1-24hasa_5506w-xfirepower_2140catalyst_9800-80_wireless_controller_firmwarec9500-48y4canalog_voice_network_interface_modules_firmwareintegrated_services_router_t1\/e1_voice_and_wan_network_interface_modules_firmwareasr_1001-xn9k-c93180lc-exn9k-sup-a\+c9500-24y4casr_1000_series_firmwareasa_5508-x4351_integrated_services_routerCisco Routers
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-667
Improper Locking
CVE-2019-5438
Assigner-HackerOne
ShareView Details
Assigner-HackerOne
CVSS Score-5.3||MEDIUM
EPSS-0.26% / 49.57%
||
7 Day CHG+0.04%
Published-10 May, 2019 | 21:06
Updated-04 Aug, 2024 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Path traversal using symlink in npm harp module versions <= 0.29.0.

Action-Not Available
Vendor-harpjsn/a
Product-harpharp
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-11879
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 10.35%
||
7 Day CHG~0.00%
Published-10 May, 2019 | 16:00
Updated-04 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem.

Action-Not Available
Vendor-n/aRuby
Product-webrickn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-2050
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.47%
||
7 Day CHG~0.00%
Published-08 May, 2019 | 16:28
Updated-04 Aug, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In tearDownClientInterface of WificondControl.java, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0 Android-8.1 Android-9 Android ID: A-121327323

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-667
Improper Locking
CVE-2019-1836
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.20% / 41.52%
||
7 Day CHG~0.00%
Published-03 May, 2019 | 16:30
Updated-21 Nov, 2024 | 19:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Symbolic Link Path Traversal Vulnerability

A vulnerability in the system shell for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to use symbolic links to overwrite system files. These system files may be sensitive and should not be overwritable by non-root users. The attacker would need valid device credentials. The vulnerability is due to incorrect symbolic link verification of directory paths when they are used in the system shell. An attacker could exploit this vulnerability by authenticating to the device and providing crafted user input to specific symbolic link CLI commands. Successful exploitation could allow the attacker to overwrite system files that should be restricted. This vulnerability has been fixed in software version 14.1(1i).

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_9500nx-osnexus_9300Cisco NX-OS Software for Nexus 9000 Series Fabric Switches ACI Mode
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2018-20834
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.75% / 72.87%
||
7 Day CHG~0.00%
Published-30 Apr, 2019 | 18:01
Updated-04 Feb, 2026 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2).

Action-Not Available
Vendor-isaacsn/a
Product-tarn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-11599
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.52% / 66.63%
||
7 Day CHG~0.00%
Published-29 Apr, 2019 | 17:07
Updated-04 Aug, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-667
Improper Locking
CVE-2019-8454
Assigner-Check Point Software Ltd.
ShareView Details
Assigner-Check Point Software Ltd.
CVSS Score-7||HIGH
EPSS-0.03% / 9.42%
||
7 Day CHG~0.00%
Published-29 Apr, 2019 | 15:10
Updated-04 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system.

Action-Not Available
Vendor-Microsoft CorporationCheck Point Software Technologies Ltd.
Product-windowsendpoint_securityCheck Point Endpoint Security client for Windows
CWE ID-CWE-65
Windows Hard Link
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-11538
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.7||HIGH
EPSS-2.15% / 84.03%
||
7 Day CHG-2.35%
Published-26 Apr, 2019 | 01:39
Updated-15 Nov, 2024 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1, an NFS problem could allow an authenticated attacker to access the contents of arbitrary files on the affected device.

Action-Not Available
Vendor-n/aIvanti Software
Product-connect_securen/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-11503
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.12%
||
7 Day CHG~0.00%
Published-24 Apr, 2019 | 20:02
Updated-04 Aug, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."

Action-Not Available
Vendor-n/aCanonical Ltd.
Product-snapdn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-11502
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.59% / 68.98%
||
7 Day CHG~0.00%
Published-24 Apr, 2019 | 20:02
Updated-04 Aug, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

snap-confine in snapd before 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.

Action-Not Available
Vendor-n/aCanonical Ltd.
Product-snapdn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-8452
Assigner-Check Point Software Ltd.
ShareView Details
Assigner-Check Point Software Ltd.
CVSS Score-7.8||HIGH
EPSS-0.22% / 44.43%
||
7 Day CHG~0.00%
Published-22 Apr, 2019 | 21:43
Updated-04 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.

Action-Not Available
Vendor-Check Point Software Technologies Ltd.
Product-endpoint_securityzonealarmCheck Point ZoneAlarmCheck Point Endpoint Security client for Windows
CWE ID-CWE-65
Windows Hard Link
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-3902
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.55% / 67.75%
||
7 Day CHG-0.20%
Published-22 Apr, 2019 | 15:29
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subrepositories to defeat Mercurial's path-checking logic and write files outside a repository.

Action-Not Available
Vendor-mercurialThe Mercurial ProjectDebian GNU/LinuxRed Hat, Inc.
Product-mercurialdebian_linuxenterprise_linuxmercurial
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-3901
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.07% / 21.58%
||
7 Day CHG~0.00%
Published-22 Apr, 2019 | 15:22
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.

Action-Not Available
Vendor-Linux Kernel Organization, IncDebian GNU/LinuxNetApp, Inc.The Linux Foundation
Product-virtual_storage_console_for_vmware_vspheredebian_linuxlinux_kernelcn1610hci_management_nodevasa_provider_for_clustered_data_ontapcn1610_firmwareactive_iq_unified_manager_for_vmware_vspheresnapprotectsolidfirestorage_replication_adapter_for_clustered_data_ontap_for_vmware_vspherekernel
CWE ID-CWE-667
Improper Locking
CVE-2019-8455
Assigner-Check Point Software Ltd.
ShareView Details
Assigner-Check Point Software Ltd.
CVSS Score-7.1||HIGH
EPSS-0.08% / 23.67%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 14:05
Updated-04 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.

Action-Not Available
Vendor-n/aCheck Point Software Technologies Ltd.
Product-zonealarmCheck Point ZoneAlarm
CWE ID-CWE-65
Windows Hard Link
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-6156
Assigner-Lenovo Group Ltd.
ShareView Details
Assigner-Lenovo Group Ltd.
CVSS Score-3.3||LOW
EPSS-0.04% / 12.90%
||
7 Day CHG~0.00%
Published-10 Apr, 2019 | 17:04
Updated-16 Sep, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). Lenovo was notified that after resuming from S3 sleep mode in various versions of BIOS for Lenovo systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected.

Action-Not Available
Vendor-Lenovo Group Limited
Product-ideacentre_620s-03ikl_firmwarethinkcentre_s510qitian_m4650thinkcentre_m700zideacentre_730s-24ikb_firmwarethinkcentre_e95z_firmwarethinkcentre_e96zthinkcentre_m818z_firmwarethinkcentre_m73pthinkcentre_m720qv530-22icb\(yt_s4350\)_firmwarethinkstation_p520yta8900fthinkstation_p500lenovo_63_firmware510s-08ikl_firmwarethinkcentre_m710ethinkpad_e560p_firmwarethinkstation_p310v410z\(yt_s4250\)_firmware330-14igm_firmwarethinkstation_p510thinkcentre_m4500syangtian_me\/we_h110thinkstation_e32_firmwarethinkpad_t460paio300-23isu\(c5130\)m4500_firmwarethinkcenter_m700z_firmwarethinkstation_c30_refreshthinkcentre_m83_\(twr\)_firmwarelegion_y520t_z370_firmwareideacentre_510-15icbideacentre_510s-08ishthinkcentre_e73_\(twr\)thinkcentre_e93_\(twr\)_firmwarethinkcentre_m920tthinkcentre_m710tthinkstation_p318_firmwarev520s-08ikl_firmwarethinkcentre_m720tlegion_c530-19icb_firmwarelegion_t530-28icbideacentre_700_firmwareqt_m415_firmwarelegion_t730-28icoqitian_b4650_firmwarethinkcentre_e74_firmwarethinkcentre_m4500kthinkcentre_m6500t_firmwareaio520-24iklthinkcentre_m73_\(twr\)_firmwarethinkcentre_m4600s_firmwarethinkstation_p520c_firmwarelegion_y520t_z370thinkcentre_m4500t_firmwareyangtian_ms\/ws_h81_firmwarethinkcentre_m700z_firmwareqt_b415_firmwareqitian_m4600_firmwarethinkstation_p900_firmwarethinkcentre_m910x_firmwarethinkcentre_m910s_firmwareyangtian_afh110_firmwarethinkpad_x380_yoga_firmwareyangtian_afq150_firmwareyangtian_mc_h110_pci_firmwareh50-30g_desktopthinkcentre_e95zthinkstation_p720_firmwarethinkcentre_e93_\(sff\)_firmwarethinkcentre_x1_aiolegion_y920_tower_firmwarethinkcentre_m910q_firmwarethinkcentre_m720s_firmwareideacentre_720-18icb_firmwareqt_m410_firmwareyangtian_ms\/ws_h81thinkcentre_m4600tthinkcentre_m920q_firmwarethinkcentre_m910zthinkcentre_m920sthinkcentre_m83_\(sff\)qt_a7400thinkstation_p900thinkcentre_m710q_firmwarethinkcentre_m83_\(tiny\)qitian_4500_firmwarethinkcentre_m818zideacentre_300s-11ish_firmware510-15iklqt_m415thinkcentre_m8600t330-14igmthinkstation_p700_firmwarethinkstation_p318thinkcentre_m700sthinkcentre_m910qthinkcentre_m6600t_firmwarethinkcentre_m8600s_firmware510s-08iklthinkcentre_m720sqitian_b4550_firmwarethinkcentre_m83_\(twr\)thinkpad_e580thinkcentre_m920t_firmwarethinkstation_p500_firmwarethinkcentre_m810zyangtian_afh81_firmwarethinkcentre_m6500s_firmwarethinkcentre_m9500zthinkcentre_m810z_firmwarethinkcentre_m710qv510z_\(yt_s5250\)m4550_idthinkstation_p300thinkpad_e480_firmwarethinkcentre_m6600thinkcentre_m710e_firmwarethinkcentre_m8500sthinkcentre_m900_firmwarev310z\(yt_s3150\)_firmwarethinkcentre_m6600sthinkcentre_e75sthinkpad_t460_firmwarethinkcentre_m920zthinkstation_p330thinkcentre_m93p_tiny530s-07icb_firmwarethinkcentre_m700qthinkstation_c30_refresh_firmwareyangtian_tc\/wc_h110_pci_firmwareyangtian_mc_h81_firmwarethinkcentre_m9550zthinkcentre_e74z330-15igm_firmwarethinkcentre_m6500sthinkcentre_m9550z_firmwarethinkcentre_m8500s_firmwarethinkcentre_m73p_firmware330-15igmthinkcentre_m7300z_firmwareqitian_b4650thinkcentre_m6600qthinkcentre_m8350z_firmwarethinkstation_p700thinkcentre_e75tthinkcentre_m4500qthinkcentre_m820zv310z\(yt_s3150\)yta8900f_firmwarethinkpad_x260thinkcentre_s510_firmwarethinkcentre_m910tthinkstation_p330_firmwarethinkcentre_e75t_firmwarethinkstation_p300_firmwarethinkcentre_m73_tiny_firmwarethinkcentre_m920x_firmwareaio520-27ikl_firmwarethinkcentre_m6600_firmwarethinkcentre_m920qthinkcentre_m4500s_firmwareaio_y910-27ish_firmwarelegion_c730-19icothinkcentre_m4500q_firmwarethinkcenter_m700zthinkpad_e580_firmwarethinkcentre_m720t_firmwareaio520-24iku_firmwarethinkstation_p910m4550_id_firmwarethinkpad_x260_firmwareyangtian_tc\/wcc_h81_pci_firmwarethinkcenter_m800zthinkcentre_m800ideacentre_510-15icb_firmwareideacentre_620s-03iklthinkcentre_m800zthinkstation_p320_tinythinkcentre_m900yangtian_mc_h110_firmwarethinkcentre_m6600tthinkcentre_m93thinkstation_p330_tiny_firmwareyangtian_mf\/wf_h110_pcithinkstation_p410thinkcentre_m8350zthinkcentre_e73_\(sff\)_firmwareqt_a7400_firmwarethinkcentre_m83_\(tiny\)_firmwarev530-22icb\(yt_s4350\)thinkstation_p310_firmwarethinkpad_l480aio520-22ikuthinkpad_t460thinkcentre_e96z_firmwareyangtian_mc_h110thinkcentre_m8500tthinkcentre_m83z_\(aio\)thinkstation_d30_refreshthinkpad_l580_firmwarelegion_t530-28icb_firmwareideacentre_510a-15icb_firmwarelenovo_63ideacentre_730s-24ikblegion_y720_towerthinkcentre_e73_\(sff\)h50-30g_desktop_firmwarev530-24icb\(yt_s5350\)aio520-22ikl_firmwarethinkcentre_m700q_firmwareideacentre_300s-11ishyangtian_afq150thinkpad_s5_firmwareqitian_b4550thinkstation_p710ideacentre_300-20ish_firmwarethinkstation_p330_tinythinkcentre_m93p_\(twr\)thinkcentre_m800z_firmwarelegion_c530-19icb530s-07icbthinkcentre_e73sthinkcentre_m9500z_firmwarethinkpad_t460p_firmwarethinkcentre_m920s_firmwarethinkcentre_m8600sideacentre_720-18icbyangtian_mc_h81yangtian_tc\/wcc_h81_pcithinkpad_e570p_firmwareideacentre_510a-15icbthinkcentre_m920z_firmwarethinkcentre_m73_\(sff\)thinkcentre_m4600sthinkcentre_m710s_firmwarethinkcentre_e74sthinkstation_p720thinkcentre_m610thinkcentre_m73_tinylegion_y720_tower_firmwareideacentre_300-20ishthinkcentre_e74s_firmwarethinkstation_p920_firmwarelegion_y920_towerthinkstation_p910_firmwarethinkcentre_m920xthinkstation_p410_firmwareaio_910-27ish_firmwarethinkcentre_m83_\(sff\)_firmwarethinkcentre_m93p_\(twr\)_firmwareqt_m410yangtian_ytm6900e-00_firmwarethinkstation_s30_refresh_firmwarem4500_id_firmwarethinkcentre_m6500tv410z\(yt_s4250\)thinkstation_p520_firmwarethinkcentre_m910xaio520-22iklthinkpad_l480_firmwarethinkpad_x380_yogaaio520-24ikuthinkcentre_m6600s_firmwarethinkcentre_e93_\(sff\)thinkstation_p320thinkstation_p510_firmwareaio_y910-27ishthinkcentre_m910sideacentre_520s-23ikulegion_c730-19ico_firmwareqitian_m4600thinkcentre_m93p_tiny_firmwareqitian_4500thinkstation_p320_firmwarethinkcentre_m93_firmwarethinkstation_d30_refresh_firmwarev520t-15iklthinkcentre_m6600q_firmwareyangtian_me\/we_h110_firmwarethinkcentre_m710t_firmwarethinkcentre_m8500t_firmwarethinkcentre_m900zv510z_\(yt_s5250\)_firmwareaio520-27iklqitian_m4650_firmwareideacentre_510s-08ish_firmwarethinkcentre_e73s_firmwareaio520-24ikl_firmwarethinkpad_l580legion_t730-28ico_firmwarethinkcentre_m8300z_firmware510-15ikl_firmwarethinkpad_e570pthinkcentre_m800_firmwareaio300-23isu\(c5130\)_firmwarem4500_idyangtian_ytm6900e-00thinkcentre_m700tqt_b415yangtian_mf\/wf_h110_pci_firmwarethinkpad_s5yangtian_mf\/wf_h81_pcithinkstation_s30_refreshthinkstation_p710_firmwareaio_910-27ishthinkcentre_m8300zthinkcentre_m700t_firmwarethinkstation_p320_tiny_firmwarethinkcentre_m7300zthinkcentre_m73_\(sff\)_firmwarethinkcentre_m73_\(twr\)thinkstation_p920thinkcentre_m700s_firmwarethinkcentre_e74ideacentre_520s-23iku_firmwarethinkcentre_e74z_firmwarev520t-15ikl_firmwareyangtian_mf\/wf_h81_pci_firmwarethinkcentre_m93p_\(sff\)_firmwareyangtian_mc_h110_pciqitian_m4550thinkcentre_x1_aio_firmwarethinkcentre_m4500k_firmwarethinkpad_e480thinkcentre_e75s_firmwarev520s-08iklthinkcentre_m93p_\(sff\)thinkcentre_m8600t_firmwarethinkcentre_m610_firmwarethinkcentre_m820z_firmwareqitian_m4550_firmwarethinkpad_e560pthinkcentre_e93_\(twr\)v530-24icb\(yt_s5350\)_firmwarethinkcentre_m4600t_firmwarethinkcentre_m910t_firmwarethinkcenter_m800z_firmwarem4500yangtian_afh110thinkcentre_m710syangtian_afh81thinkcentre_m4500tideacentre_700yangtian_tc\/wc_h110_pcithinkcentre_m900z_firmwarethinkcentre_m910z_firmwarethinkcentre_m83z_\(aio\)_firmwareaio520-22iku_firmwarethinkstation_e32thinkcentre_m720q_firmwarethinkcentre_e73_\(twr\)_firmwarethinkstation_p520cBIOS
CWE ID-CWE-667
Improper Locking
CVE-2019-0841
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-82.65% / 99.22%
||
7 Day CHG-0.22%
Published-09 Apr, 2019 | 20:18
Updated-29 Oct, 2025 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-05||Apply updates per vendor instructions.

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1709windows_10_1703windows_10_1809windows_server_2019windows_server_2016windows_10_1803WindowsWindows ServerWindows
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-1002101
Assigner-7556d962-6fb7-411e-85fa-6cd62f095ba8
ShareView Details
Assigner-7556d962-6fb7-411e-85fa-6cd62f095ba8
CVSS Score-6.4||MEDIUM
EPSS-50.61% / 97.81%
||
7 Day CHG+1.90%
Published-01 Apr, 2019 | 14:14
Updated-16 Sep, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
kubectl cp path traversal

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

Action-Not Available
Vendor-Red Hat, Inc.Kubernetes
Product-kubernetesopenshift_container_platformKubernetes
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-5674
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-7||HIGH
EPSS-0.20% / 41.61%
||
7 Day CHG-0.01%
Published-28 Mar, 2019 | 14:09
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GeForce Experience before 3.18 contains a vulnerability when ShadowPlay or GameStream is enabled. When an attacker has access to the system and creates a hard link, the software does not check for hard link attacks. This behavior may lead to code execution, denial of service, or escalation of privileges.

Action-Not Available
Vendor-NVIDIA Corporation
Product-geforce_experienceGeForce Experience
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2018-17955
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Assigner-OpenText (formerly Micro Focus)
CVSS Score-2.2||LOW
EPSS-0.04% / 11.84%
||
7 Day CHG~0.00%
Published-15 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 23:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Static tempfile name allows overwriting of arbitrary files

In yast2-multipath before version 4.1.1 a static temporary filename allows local attackers to overwrite files on systems without symlink protection

Action-Not Available
Vendor-openSUSESUSE
Product-yast2-multipathyast2-multipath
CWE ID-CWE-377
Insecure Temporary File
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-8275
Assigner-Kaspersky
ShareView Details
Assigner-Kaspersky
CVSS Score-9.8||CRITICAL
EPSS-4.33% / 88.75%
||
7 Day CHG~0.00%
Published-09 Mar, 2019 | 00:00
Updated-17 Sep, 2024 | 03:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UltraVNC revision 1211 has multiple improper null termination vulnerabilities in VNC server code, which result in out-of-bound data being accessed by remote users. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.

Action-Not Available
Vendor-uvncSiemens AGKaspersky Lab
Product-sinumerik_pcu_base_win10_software\/ipcultravncsinumerik_pcu_base_win7_software\/ipcsinumerik_access_mymachine\/p2pUltraVNC
CWE ID-CWE-170
Improper Null Termination
CVE-2018-19638
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Assigner-OpenText (formerly Micro Focus)
CVSS Score-2.2||LOW
EPSS-0.04% / 12.76%
||
7 Day CHG~0.00%
Published-05 Mar, 2019 | 16:00
Updated-17 Sep, 2024 | 00:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
User can overwrite arbitrary log files in support tar

In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files.

Action-Not Available
Vendor-openSUSESUSE
Product-supportutilssupportutils
CWE ID-CWE-377
Insecure Temporary File
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2018-19637
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Assigner-OpenText (formerly Micro Focus)
CVSS Score-2.8||LOW
EPSS-0.04% / 11.84%
||
7 Day CHG~0.00%
Published-05 Mar, 2019 | 16:00
Updated-16 Sep, 2024 | 20:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Static temporary filename allows overwriting of files

Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection

Action-Not Available
Vendor-openSUSESUSE
Product-supportutilssupportutils
CWE ID-CWE-377
Insecure Temporary File
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-5665
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.18%
||
7 Day CHG~0.00%
Published-27 Feb, 2019 | 23:00
Updated-17 Sep, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Windows GPU Display driver contains a vulnerability in the 3D vision component in which the stereo service software, when opening a file, does not check for hard links. This behavior may lead to code execution, denial of service or escalation of privileges.

Action-Not Available
Vendor-NVIDIA CorporationMicrosoft Corporation
Product-windowsgpu_driverNVIDIA GPU Graphics Driver
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-8372
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.18% / 40.09%
||
7 Day CHG~0.00%
Published-18 Feb, 2019 | 15:00
Updated-04 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The LHA.sys driver before 1.1.1811.2101 in LG Device Manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted IOCTL requests and elevate system privileges. This occurs because the device object has an associated symbolic link and an open DACL.

Action-Not Available
Vendor-n/aLG Electronics Inc.
Product-lha.sysn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2017-1002157
Assigner-Fedora Project
ShareView Details
Assigner-Fedora Project
CVSS Score-9.8||CRITICAL
EPSS-1.37% / 80.04%
||
7 Day CHG+0.65%
Published-10 Jan, 2019 | 21:00
Updated-16 Sep, 2024 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution.

Action-Not Available
Vendor-Fedora ModularityRed Hat, Inc.
Product-modulemdmodulemd
CWE ID-CWE-242
Use of Inherently Dangerous Function
CWE ID-CWE-20
Improper Input Validation
CVE-2019-5886
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 60.79%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 14:00
Updated-04 Aug, 2024 | 20:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in ShopXO 1.2.0. In the application\install\controller\Index.php file, there is no validation lock file in the Add method, which allows an attacker to reinstall the database. The attacker can write arbitrary code to database.php during system reinstallation.

Action-Not Available
Vendor-shopxon/a
Product-shopxon/a
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-667
Improper Locking
CVE-2019-0572
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-6.36% / 90.86%
||
7 Day CHG~0.00%
Published-08 Jan, 2019 | 21:00
Updated-04 Aug, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations, aka "Windows Data Sharing Service Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers. This CVE ID is unique from CVE-2019-0571, CVE-2019-0573, CVE-2019-0574.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2019windows_10Windows Server 2019Windows 10Windows 10 ServersWindows Server 2016
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-0574
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-4.02% / 88.31%
||
7 Day CHG~0.00%
Published-08 Jan, 2019 | 21:00
Updated-04 Aug, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations, aka "Windows Data Sharing Service Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers. This CVE ID is unique from CVE-2019-0571, CVE-2019-0572, CVE-2019-0573.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2019windows_10Windows Server 2019Windows 10Windows 10 ServersWindows Server 2016
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2018-8599
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.36% / 57.95%
||
7 Day CHG~0.00%
Published-12 Dec, 2018 | 00:00
Updated-05 Aug, 2024 | 07:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations, aka "Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability." This affects Microsoft Visual Studio, Windows Server 2019, Windows Server 2016, Windows 10, Windows 10 Servers.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016visual_studiowindows_10visual_studio_2017windows_server_2019Microsoft Visual StudioWindows 10 ServersWindows 10Windows Server 2019Windows Server 2016
CWE ID-CWE-273
Improper Check for Dropped Privileges
CVE-2018-1780
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.61%
||
7 Day CHG~0.00%
Published-09 Nov, 2018 | 00:00
Updated-16 Sep, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 could allow a local db2 instance owner to obtain root access by exploiting a symbolic link attack to read/write/corrupt a file that they originally did not have permission to access. IBM X-Force ID: 148803.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-windowsdb2linux_kernelDB2 for Linux, UNIX and Windows
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2018-1834
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-7.4||HIGH
EPSS-0.04% / 11.53%
||
7 Day CHG~0.00%
Published-09 Nov, 2018 | 00:00
Updated-17 Sep, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 contains a vulnerability that could allow a local user to escalate their privileges to root through a symbolic link attack. IBM X-Force ID: 150511.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-windowsdb2linux_kernelDB2 for Linux, UNIX and Windows
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2018-1781
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-8.4||HIGH
EPSS-0.04% / 12.33%
||
7 Day CHG~0.00%
Published-09 Nov, 2018 | 00:00
Updated-17 Sep, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 could allow a local user to obtain root access by exploiting a symbolic link attack to read/write/corrupt a file that they originally did not have permission to access. IBM X-Force ID: 148804.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-windowsdb2linux_kernelDB2 for Linux, UNIX and Windows
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
  • Previous
  • 1
  • 2
  • ...
  • 31
  • 32
  • 33
  • ...
  • 43
  • 44
  • Next