Show filters
330 Total Results
Displaying 41-50 of 330
Sort by:
Attacker Value
Unknown

CVE-2021-1958

Disclosure Date: September 09, 2021 (last updated February 23, 2025)
A race condition in fastrpc kernel driver for dynamic process creation can lead to use after free scenario in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wearables
Attacker Value
Unknown

CVE-2021-22004

Disclosure Date: September 08, 2021 (last updated February 23, 2025)
An issue was discovered in SaltStack Salt before 3003.3. The salt minion installer will accept and use a minion config file at C:\salt\conf if that file is in place before the installer is run. This allows for a malicious actor to subvert the proper behaviour of the given minion software.
Attacker Value
Unknown

CVE-2021-30714

Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A race condition was addressed with improved state handling. This issue is fixed in iOS 14.6 and iPadOS 14.6. An application may be able to cause unexpected system termination or write kernel memory.
Attacker Value
Unknown

CVE-2021-1884

Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A race condition was addressed with improved locking. This issue is fixed in Security Update 2021-004 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, Security Update 2021-003 Catalina, tvOS 14.5, macOS Big Sur 11.3. A remote attacker may be able to cause a denial of service.
Attacker Value
Unknown

CVE-2021-30652

Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A race condition was addressed with additional validation. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. A malicious application may be able to gain root privileges.
Attacker Value
Unknown

CVE-2021-30786

Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A race condition was addressed with improved state handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.
Attacker Value
Unknown

CVE-2021-28701

Disclosure Date: September 08, 2021 (last updated February 23, 2025)
Another race in XENMAPSPACE_grant_table handling Guests are permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, are de-allocated when a guest switches (back) from v2 to v1. Freeing such pages requires that the hypervisor enforce that no parallel request can result in the addition of a mapping of such a page to a guest. That enforcement was missing, allowing guests to retain access to pages that were freed and perhaps re-used for other purposes. Unfortunately, when XSA-379 was being prepared, this similar issue was not noticed.
Attacker Value
Unknown

CVE-2021-40490

Disclosure Date: September 03, 2021 (last updated February 23, 2025)
A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.
Attacker Value
Unknown

CVE-2021-31797

Disclosure Date: September 02, 2021 (last updated February 23, 2025)
The user identification mechanism used by CyberArk Credential Provider prior to 12.1 is susceptible to a local host race condition, leading to password disclosure.
Attacker Value
Unknown

CVE-2021-28697

Disclosure Date: August 27, 2021 (last updated February 23, 2025)
grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, get de-allocated when a guest switched (back) from v2 to v1. The freeing of such pages requires that the hypervisor know where in the guest these pages were mapped. The hypervisor tracks only one use within guest space, but racing requests from the guest to insert mappings of these pages may result in any of them to become mapped in multiple locations. Upon switching back from v2 to v1, the guest would then retain access to a page that was freed and perhaps re-used for other purposes.