Search Results (601 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-6217 1 Peak-system 1 Device Driver 2025-08-18 2.5 Low
PEAK-System Driver PCANFD_ADD_FILTERS Time-Of-Check Time-Of-Use Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of PEAK-System Driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the PCANFD_ADD_FILTERS IOCTL. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-24161.
CVE-2025-54667 2 Mycred, Wordpress 2 Mycred, Wordpress 2025-08-16 5.3 Medium
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Saad Iqbal myCred allows Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions. This issue affects myCred: from n/a through 2.9.4.3.
CVE-2024-41779 1 Ibm 2 Engineering Systems Design Rhapsody, Rhapsody Model Manager 2025-08-15 9.8 Critical
IBM Engineering Systems Design Rhapsody - Model Manager 7.0.2 and 7.0.3 could allow a remote attacker to bypass security restrictions, caused by a race condition. By sending a specially crafted request, an attacker could exploit this vulnerability to remotely execute code.
CVE-2023-32156 1 Tesla 2 Model 3, Model 3 Firmware 2025-08-13 8.8 High
Tesla Model 3 Gateway Firmware Signature Validation Bypass Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to execute privileged code on the Tesla infotainment system in order to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from improper error-handling during the update process. An attacker can leverage this vulnerability to execute code in the context of Tesla's Gateway ECU. . Was ZDI-CAN-20734.
CVE-2024-6029 1 Tesla 2 Model S, Model S Firmware 2025-08-12 N/A
Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. An attacker can leverage this vulnerability to bypass firewall rules. Was ZDI-CAN-23197.
CVE-2023-33046 1 Qualcomm 98 Ar8035, Ar8035 Firmware, Fastconnect 6900 and 95 more 2025-08-11 7.8 High
Memory corruption in Trusted Execution Environment while deinitializing an object used for license validation.
CVE-2024-9512 1 Gitlab 1 Gitlab 2025-08-08 5.3 Medium
An issue has been discovered in GitLab EE affecting all versions prior to 17.10.8, 17.11 prior to 17.11.4, and 18.0 prior to 18.0.2. It may have been possible for private repository to be cloned in case of race condition when a secondary node is out of sync.
CVE-2015-1865 1 Gnu 1 Coreutils 2025-08-06 5.1 Medium
fts.c in coreutils 8.4 allows local users to delete arbitrary files.
CVE-2023-27327 1 Parallels 1 Parallels Desktop 2025-08-06 N/A
Parallels Desktop Toolgate Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the current user on the host system. Was ZDI-CAN-18964.
CVE-2023-27323 1 Parallels 1 Parallels Desktop 2025-08-06 N/A
Parallels Desktop Updater Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. . Was ZDI-CAN-18150.
CVE-2024-27238 1 Zoom 3 Meeting Software Development Kit, Rooms, Workplace Desktop 2025-08-05 7.1 High
Race condition in the installer for some Zoom Apps and SDKs for Windows before version 6.0.0 may allow an authenticated user to conduct a privilege escalation via local access.
CVE-2024-39821 1 Zoom 2 Rooms, Workplace Desktop 2025-08-05 6.6 Medium
Race condition in the installer for Zoom Workplace App for Windows and Zoom Rooms App for Windows may allow an authenticated user to conduct a denial of service via local access.
CVE-2025-8192 2 Android, Google 3 Android, Tv, Android Tv 2025-07-31 N/A
There exists a TOCTOU race condition in TvSettings AppRestrictionsFragment.java that lead to start of attacker supplied activity in Settings’ context, i.e. system-uid context, thus lead to launchAnyWhere. The core idea is to utilize the time window between the check of Intent and the use to Intent to change the target component’s state, thus bypass the original security sanitize function.
CVE-2024-1729 1 Gradio Project 1 Gradio 2025-07-30 N/A
A timing attack vulnerability exists in the gradio-app/gradio repository, specifically within the login function in routes.py. The vulnerability arises from the use of a direct comparison operation (`app.auth[username] == password`) to validate user credentials, which can be exploited to guess passwords based on response times. Successful exploitation of this vulnerability could allow an attacker to bypass authentication mechanisms and gain unauthorized access.
CVE-2022-44670 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2025-07-22 8.1 High
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVE-2025-2425 2025-07-22 N/A
Time-of-check to time-of-use race condition vulnerability potentially allowed an attacker to use the installed ESET security software to clear the content of an arbitrary file on the file system.
CVE-2020-15522 2 Bouncycastle, Redhat 8 Bc-csharp, Bouncy Castle Fips .net Api, Fips Java Api and 5 more 2025-07-17 5.9 Medium
Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
CVE-2025-27812 1 Msi 1 Center 2025-07-13 8.1 High
MSI Center before 2.0.52.0 allows TOCTOU Local Privilege Escalation.
CVE-2024-37181 1 Intel 1 Neural Compressor Software 2025-07-12 2.6 Low
Time-of-check time-of-use race condition in some Intel(R) Neural Compressor software before version v3.0 may allow an authenticated user to potentially enable information disclosure via adjacent access.
CVE-2024-3290 1 Tenable 1 Nessus 2025-07-12 8.2 High
A race condition vulnerability exists where an authenticated, local attacker on a Windows Nessus host could modify installation parameters at installation time, which could lead to the execution of arbitrary code on the Nessus host