Show filters
321 Total Results
Displaying 31-40 of 321
Sort by:
Attacker Value
Unknown
CVE-2021-39212
Disclosure Date: September 13, 2021 (last updated February 23, 2025)
ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. <policy domain="module" rights="none" pattern="PS" />. The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: <policy domain="coder" rights="none" pattern="{PS,EPI,EPS,EPSF,EPSI}" />.
0
Attacker Value
Unknown
CVE-2021-1958
Disclosure Date: September 09, 2021 (last updated February 23, 2025)
A race condition in fastrpc kernel driver for dynamic process creation can lead to use after free scenario in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wearables
0
Attacker Value
Unknown
CVE-2021-22004
Disclosure Date: September 08, 2021 (last updated February 23, 2025)
An issue was discovered in SaltStack Salt before 3003.3. The salt minion installer will accept and use a minion config file at C:\salt\conf if that file is in place before the installer is run. This allows for a malicious actor to subvert the proper behaviour of the given minion software.
0
Attacker Value
Unknown
CVE-2021-30714
Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A race condition was addressed with improved state handling. This issue is fixed in iOS 14.6 and iPadOS 14.6. An application may be able to cause unexpected system termination or write kernel memory.
0
Attacker Value
Unknown
CVE-2021-1884
Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A race condition was addressed with improved locking. This issue is fixed in Security Update 2021-004 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, Security Update 2021-003 Catalina, tvOS 14.5, macOS Big Sur 11.3. A remote attacker may be able to cause a denial of service.
0
Attacker Value
Unknown
CVE-2021-30652
Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A race condition was addressed with additional validation. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. A malicious application may be able to gain root privileges.
0
Attacker Value
Unknown
CVE-2021-30786
Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A race condition was addressed with improved state handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-28701
Disclosure Date: September 08, 2021 (last updated February 23, 2025)
Another race in XENMAPSPACE_grant_table handling Guests are permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, are de-allocated when a guest switches (back) from v2 to v1. Freeing such pages requires that the hypervisor enforce that no parallel request can result in the addition of a mapping of such a page to a guest. That enforcement was missing, allowing guests to retain access to pages that were freed and perhaps re-used for other purposes. Unfortunately, when XSA-379 was being prepared, this similar issue was not noticed.
0
Attacker Value
Unknown
CVE-2021-40490
Disclosure Date: September 03, 2021 (last updated February 23, 2025)
A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.
0
Attacker Value
Unknown
CVE-2021-31797
Disclosure Date: September 02, 2021 (last updated February 23, 2025)
The user identification mechanism used by CyberArk Credential Provider prior to 12.1 is susceptible to a local host race condition, leading to password disclosure.
0