Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-59 (在文件访问前对链接解析不恰当(链接跟随)) — Vulnerability Class 418

418 vulnerabilities classified as CWE-59 (在文件访问前对链接解析不恰当(链接跟随)). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2026-6941 radare2 < 6.1.4 Project Notes Path Traversal via Symlink — radare2 6.6 Medium2026-04-23
CVE-2026-33694 Junction File Manipulation — Tenable Nessus, Tenable Nessus Agent 8.4AIHighAI2026-04-23
CVE-2026-41231 Froxlor has Incomplete Symlink Validation in DataDump.add() that Allows Arbitrary Directory Ownership Takeover via Cron — froxlor 7.5 High2026-04-23
CVE-2026-35365 uutils coreutils mv Denial of Service and Data Duplication via Improper Symlink Expansion — coreutils 6.6 Medium2026-04-22
CVE-2026-35349 uutils coreutils Path-Based Safety Bypass with --preserve-root — coreutils 6.7 Medium2026-04-22
CVE-2026-40931 Complete Bypass of CVE-2026-24884 Patch via Git-Delivered Symlink Poisoning in compressing — compressing 8.4 High2026-04-21
CVE-2026-28684 python-dotenv: Symlink following in set_key allows arbitrary file overwrite via cross-device rename fallback — python-dotenv 6.6 Medium2026-04-20
CVE-2026-20161 Cisco ThousandEyes Enterprise Agent Arbitrary File Overwrite Vulnerability — Cisco ThousandEyes Enterprise Agent 5.5 Medium2026-04-15
CVE-2026-4135 Lenovo Software Fix 安全漏洞 — Software Fix 6.6 Medium2026-04-15
CVE-2026-0827 Lenovo Diagnostics 安全漏洞 — Diagnostics 7.1 High2026-04-15
CVE-2026-32212 Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability — Windows 10 Version 1607 5.5 Medium2026-04-14
CVE-2026-35400 LORIS incorrectly trusts user input in publication module — Loris 3.5 Low2026-04-08
CVE-2026-27456 util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup — util-linux 4.7 Medium2026-04-03
CVE-2026-34452 Claude SDK for Python: Memory Tool Path Validation Race Condition Allows Sandbox Escape — anthropic-sdk-python 8.4 -2026-03-31
CVE-2026-32054 OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling — OpenClaw 6.5 Medium2026-03-21
CVE-2026-32024 OpenClaw < 2026.2.22 - Symlink Traversal in Avatar Handling — OpenClaw 5.5 Medium2026-03-19
CVE-2026-32020 OpenClaw < 2026.2.22 - Arbitrary File Read via Symlink Following in Static File Handler — OpenClaw 3.3 Low2026-03-19
CVE-2026-32013 OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods — OpenClaw 8.8 High2026-03-19
CVE-2026-31990 OpenClaw < 2026.3.2 - Symlink Traversal in stageSandboxMedia Destination — OpenClaw 6.1 Medium2026-03-19
CVE-2026-22180 OpenClaw < 2026.3.2 - Path Confinement Bypass in Browser Output and File Write Operations — OpenClaw 5.3 Medium2026-03-18
CVE-2026-2808 Consul vulnerable to arbitrary file reads through the vault kubernetes authentication provider — Consul 6.8 Medium2026-03-11
CVE-2026-31979 himmelblaud-tasks: local privilege escalation via /tmp symlink attack on Kerberos ccache — himmelblau 8.8 High2026-03-11
CVE-2026-31894 WeGIA affected by arbitrary file read via symlink in backup restore — WeGIA 7.5AIHighAI2026-03-11
CVE-2026-25187 Winlogon Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.8 High2026-03-10
CVE-2026-28689 ImageMagick has a Path Policy TOCTOU symlink race bypass — ImageMagick 6.3 Medium2026-03-09
CVE-2026-27748 Avira Internet Security Arbitrary File Deletion via Improper Link Resolution — Avira Internet Security 7.8 High2026-03-05
CVE-2026-27905 BentoML has an Arbitrary File Write via Symlink Path Traversal in Tar Extraction — BentoML 7.4AIHighAI2026-03-03
CVE-2026-25906 Dell Optimizer 后置链接漏洞 — Optimizer 7.3 High2026-03-03
CVE-2026-27967 Symlink Escape in Agent File Tools — zed 7.1 High2026-02-25
CVE-2026-2490 RustDesk Client for Windows Transfer File Link Following Information Disclosure Vulnerability — Client for Windows 5.5AIMediumAI2026-02-20

Vulnerabilities classified as CWE-59 (在文件访问前对链接解析不恰当(链接跟随)) represent 418 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.