Search Results (3269 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-31327 1 Google 1 Android 2025-03-14 5.3 Medium
In multiple functions of MessageQueueBase.h, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2022-45842 1 Technowich 1 Wp Ulike 2025-03-14 5.3 Medium
Unauth. Race Condition vulnerability in WP ULike Plugin <= 4.6.4 on WordPress allows attackers to increase/decrease rating scores.
CVE-2023-52553 1 Huawei 2 Emui, Harmonyos 2025-03-13 7.4 High
Race condition vulnerability in the Wi-Fi module. Impact: Successful exploitation of this vulnerability will affect availability.
CVE-2024-6996 1 Google 1 Chrome 2025-03-13 3.1 Low
Race in Frames in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
CVE-2022-32844 1 Apple 4 Ipados, Iphone Os, Tvos and 1 more 2025-03-11 6.3 Medium
A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app with arbitrary kernel read and write capability may be able to bypass Pointer Authentication.
CVE-2023-23520 1 Apple 3 Ipados, Iphone Os, Macos 2025-03-11 5.9 Medium
A race condition was addressed with additional validation. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. A user may be able to read arbitrary files as root.
CVE-2022-34725 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-03-11 7 High
Windows ALPC Elevation of Privilege Vulnerability
CVE-2022-26928 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-03-11 7 High
Windows Photo Import API Elevation of Privilege Vulnerability
CVE-2022-46713 1 Apple 1 Macos 2025-03-11 4.7 Medium
A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13, macOS Monterey 12.6.1, macOS Big Sur 11.7.1. An app may be able to modify protected parts of the file system.
CVE-2023-23109 1 Crasm Project 1 Crasm 2025-03-11 7.5 High
In crasm 1.8-3, invalid input validation, specific files passed to the command line application, can lead to a divide by zero fault in the function opdiv.
CVE-2024-27114 2 So Planning, Soplanning 2 Simple Online Planning, Soplanning 2025-03-11 9.8 Critical
A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. If the public view setting is enabled, a attacker can upload a PHP-file that will be available for execution for a few milliseconds before it is removed, leading to execution of code on the underlying system. The vulnerability has been remediated in version 1.52.02.
CVE-2023-22499 1 Deno 1 Deno 2025-03-10 7.5 High
Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. Multi-threaded programs were able to spoof interactive permission prompt by rewriting the prompt to suggest that program is waiting on user confirmation to unrelated action. A malicious program could clear the terminal screen after permission prompt was shown and write a generic message. This situation impacts users who use Web Worker API and relied on interactive permission prompt. The reproduction is very timing sensitive and can’t be reliably reproduced on every try. This problem can not be exploited on systems that do not attach an interactive prompt (for example headless servers). The problem has been fixed in Deno v1.29.3; it is recommended all users update to this version. Users are advised to upgrade. Users unable to upgrade may run with --no-prompt flag to disable interactive permission prompts.
CVE-2023-38041 2 Ivanti, Microsoft 2 Secure Access Client, Windows 2025-03-07 7.0 High
A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system.
CVE-2023-34046 2 Apple, Vmware 2 Mac Os X, Fusion 2025-03-07 6.7 Medium
VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during installation for the first time (the user needs to drag or copy the application to a folder from the '.dmg' volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed or being installed for the first time.
CVE-2024-53694 2025-03-07 N/A
A time-of-check time-of-use (TOCTOU) race condition vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local attackers who have gained user access to gain access to otherwise unauthorized resources. We have already fixed the vulnerability in the following versions: QVPN Device Client for Mac 2.2.5 and later Qsync for Mac 5.1.3 and later Qfinder Pro Mac 7.11.1 and later
CVE-2023-1127 2 Fedoraproject, Vim 2 Fedora, Vim 2025-03-07 7.8 High
Divide By Zero in GitHub repository vim/vim prior to 9.0.1367.
CVE-2024-53032 1 Qualcomm 52 Qam8255p, Qam8255p Firmware, Qam8295p and 49 more 2025-03-07 7.8 High
Memory corruption may occur in keyboard virtual device due to guest VM interaction.
CVE-2023-20623 3 Google, Mediatek, Yoctoproject 37 Android, Mt6580, Mt6735 and 34 more 2025-03-06 6.4 Medium
In ion, there is a possible escalation of privilege due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559778; Issue ID: ALPS07559778.
CVE-2021-20251 2 Fedoraproject, Samba 2 Fedora, Samba 2025-03-06 5.9 Medium
A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.
CVE-2023-20620 2 Google, Mediatek 4 Android, Mt6879, Mt6895 and 1 more 2025-03-06 4.1 Medium
In adsp, there is a possible escalation of privilege due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07554558; Issue ID: ALPS07554558.