1 results (0.003 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 5

Hard link and possibly symbolic link following vulnerabilities in QNX RTOS 4.25 (aka QNX4) allow local users to overwrite arbitrary files via (1) the -f argument to the monitor utility, (2) the -d argument to dumper, (3) the -c argument to crttrap, or (4) using the Watcom sample utility. • https://www.exploit-db.com/exploits/21499 https://www.exploit-db.com/exploits/21501 https://www.exploit-db.com/exploits/21500 http://archives.neohapsis.com/archives/bugtraq/2002-05/0292.html http://www.iss.net/security_center/static/9231.php http://www.securityfocus.com/bid/4901 http://www.securityfocus.com/bid/4902 http://www.securityfocus.com/bid/4903 http://www.securityfocus.com/bid/4904 https://exchange.xforce.ibmcloud.com/vulnerabilities/9232 https://exchange.xforce • CWE-59: Improper Link Resolution Before File Access ('Link Following') •