CWE-59: CWE-59
Yearly Trend
Top Affected Vendors
All CWE-59 CVEs (279)
This CVE describes an Improper Link Resolution Before File Access vulnerability in multiple Dell PowerFlex and related products. An unauthenticated at...
Dec 10, 2024CVE-2024-28185 is a critical symlink vulnerability in Judge0 that allows attackers to write arbitrary files outside the sandbox, potentially leading t...
Apr 18, 2024This CVE describes a link following vulnerability in QNAP operating systems that allows remote attackers to traverse the file system to unintended loc...
Feb 11, 2026This vulnerability allows malicious applications to bypass symlink validation and access protected user data on Apple devices. It affects users runnin...
Jul 30, 2025This macOS vulnerability allows malicious applications to create symbolic links to protected disk regions, potentially bypassing security restrictions...
Mar 31, 2025CVE-2024-48862 is a path traversal vulnerability in QNAP's QuLog Center that allows remote attackers to access or modify files outside the intended di...
Nov 22, 2024CVE-2024-6868 is a critical vulnerability in mudler/LocalAI version 2.17.1 that allows arbitrary file write through improper archive extraction handli...
Oct 29, 2024This vulnerability in Apache Hadoop allows attackers to write arbitrary files outside the intended extraction directory on Windows systems during TAR ...
Apr 7, 2022This vulnerability allows Jenkins agents to create symbolic links on the controller without proper permission checks. Attackers with agent access can ...
Nov 4, 2021This vulnerability in G-Data antivirus software allows attackers to use symbolic links to abuse the infected-file restore mechanism, leading to arbitr...
Dec 28, 2020This CVE describes a path collision vulnerability in GitHub Enterprise Server that allows container escape and arbitrary code execution with root priv...
Nov 7, 2024CVE-2024-3829 is a path traversal vulnerability in qdrant/qdrant that allows attackers to read and write arbitrary files during snapshot recovery. By ...
Jun 3, 2024This vulnerability in Foxit Reader and PhantomPDF allows attackers to delete arbitrary files during uninstallation via symbolic link manipulation. It ...
Aug 11, 2021This vulnerability allows a low-privileged remote attacker with file access to replace a critical watchdog file, gaining read, write, and execute acce...
Jul 8, 2025CVE-2025-41668 allows a low-privileged remote attacker with file access to replace critical files used by the service security-profile, gaining read, ...
Jul 8, 2025This CVE describes a local privilege escalation vulnerability in Microsoft Edge where an attacker can exploit improper link resolution to gain elevate...
May 22, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of binary-husky/gpt_academic. Attackers ca...
Mar 20, 2025GPT Academic version 3.83 contains a Local File Inclusion vulnerability in its HotReload function that allows attackers to read arbitrary files on the...
Mar 20, 2025This CVE describes a link following vulnerability in Qsync Central that allows remote attackers with user access to traverse the file system to uninte...
Dec 6, 2024This vulnerability in HP Hotkey Support software allows local attackers to escalate privileges on affected HP systems. It affects users of HP Programm...
Oct 7, 2024A macOS sandbox escape vulnerability allows malicious applications to bypass security restrictions by exploiting improper symlink handling. This affec...
Sep 17, 2024This vulnerability allows attackers to elevate privileges on Windows systems running Xbox Gaming Services. An authenticated attacker could exploit thi...
Mar 21, 2024This vulnerability in Minecraft Java Edition allows attackers to overwrite arbitrary files and potentially execute code by crafting malicious world da...
May 30, 2023This vulnerability allows a remote attacker to escalate privileges on Windows systems by tricking users into running a malicious Chrome offline instal...
Apr 5, 2022This vulnerability in Jenkins allows agents to access files outside their permitted directories by exploiting symbolic links. Attackers can read sensi...
Nov 4, 2021This vulnerability in the Compressing library allows attackers to write files to arbitrary locations on the host filesystem by exploiting improper sym...
Feb 4, 2026This vulnerability in Zillya Total Security allows low-privileged users to escalate privileges by exploiting the quarantine module's file restoration ...
Dec 22, 2025This vulnerability allows a local user on IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0-10.0.6.1 and IBM Securi...
Jan 11, 2024This vulnerability in Pterodactyl Wings allows attackers with existing server access to create arbitrary files and directories on the host system. Thi...
Feb 8, 2023This vulnerability in Deno's file sandbox allows attackers to bypass directory restrictions via symbolic links. When Deno is run with write permission...
Jun 12, 2022This vulnerability in Intel Graphics Driver installers allows authenticated local users to exploit improper link resolution (symlink attacks) to escal...
May 13, 2025This vulnerability allows local users on Linux systems running McAfee Endpoint Security to escalate privileges to root/admin level through a race cond...
May 12, 2021This vulnerability in NCP Secure Enterprise Client's Support Assistant allows attackers to delete arbitrary files on the operating system by exploitin...
Dec 9, 2023The Jenkins CloudBees CD Plugin vulnerability allows attackers with job configuration permissions to delete arbitrary files on the Jenkins controller ...
Oct 25, 2023A privilege escalation vulnerability in Check Point Identity Agent allows low-privileged users to overwrite protected system files, potentially leadin...
Apr 22, 2021A Time-of-Check-Time-of-Use (TOCTOU) vulnerability in Quick Heal Total Security allows local attackers to escalate privileges by replacing malicious f...
May 23, 2022This vulnerability in Softland FBackup allows local attackers to exploit a link following weakness (CWE-59) in the HID.dll library during backup/resto...
Feb 17, 2026A macOS vulnerability allows malicious applications to gain root privileges through improper symlink handling. This affects macOS systems before versi...
Feb 11, 2026CVE-2025-15310 is a local privilege escalation vulnerability in Tanium Patch Endpoint Tools that allows authenticated local users to gain elevated pri...
Feb 10, 2026CVE-2025-15319 is a local privilege escalation vulnerability in Tanium's Endpoint Configuration Toolset Solution that allows authenticated local users...
Feb 9, 2026This vulnerability allows an authenticated attacker to exploit improper link resolution in the Windows Task Host process to elevate privileges locally...
Jan 13, 2026This CVE describes a local privilege escalation vulnerability in Bitdefender Total Security where low-privileged attackers can delete arbitrary files ...
Dec 10, 2025This vulnerability allows an authorized attacker to exploit improper link resolution in the Host Process for Windows Tasks to elevate privileges local...
Nov 11, 2025A local privilege escalation vulnerability in Razer Synapse 3's Chroma Connect SDK installer allows attackers to delete arbitrary files via symbolic l...
Oct 29, 2025This vulnerability in Razer Synapse 3 allows local attackers to escalate privileges by exploiting a symbolic link issue in the Razer Synapse Service. ...
Oct 29, 2025This vulnerability in AntiDupl software allows local attackers to exploit link following (symlink attack) through the Delete Duplicate Image Handler f...
Oct 28, 2025This CVE describes a local privilege escalation vulnerability in XBox Gaming Services where an authorized attacker can exploit improper link resolutio...
Oct 14, 2025This vulnerability allows attackers with write access to the configuration file or filesystem to replace the yt-dlp executable with malicious code or ...
Oct 13, 2025This vulnerability in AWS VPN Client for macOS allows local users to escalate privileges to root by exploiting improper symlink validation during log ...
Oct 7, 2025This vulnerability allows local unprivileged users to escalate privileges to SYSTEM level by exploiting insecure temporary file handling in Vasion Pri...
Sep 19, 2025About CWE-59 (CWE-59)
Our database tracks 279 CVEs classified as CWE-59, with 13 rated critical and 198 rated high severity. The average CVSS score for CWE-59 vulnerabilities is 7.4.
External reference: View CWE-59 on MITRE CWE →
Monitor CWE-59 Vulnerabilities
Get alerted when new CWE-59 CVEs affect your infrastructure.
Start Monitoring Free