Show filters
71 Total Results
Displaying 21-30 of 71
Sort by:
Attacker Value
Unknown

CVE-2020-11230

Disclosure Date: March 17, 2021 (last updated February 22, 2025)
Potential arbitrary memory corruption when the qseecom driver updates ion physical addresses in the buffer as it exposes a physical address to user land in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
Attacker Value
Unknown

CVE-2021-23977

Disclosure Date: February 26, 2021 (last updated February 22, 2025)
Firefox for Android suffered from a time-of-check-time-of-use vulnerability that allowed a malicious application to read sensitive data from application directories. Note: This issue is only affected Firefox for Android. Other operating systems are unaffected. This vulnerability affects Firefox < 86.
Attacker Value
Unknown

CVE-2021-26910

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.
Attacker Value
Unknown

CVE-2020-14418

Disclosure Date: January 30, 2021 (last updated February 22, 2025)
A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. This occurs because path redirection can occur via vectors involving directory junctions.
Attacker Value
Unknown

CVE-2021-21615

Disclosure Date: January 26, 2021 (last updated February 22, 2025)
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.
Attacker Value
Unknown

CVE-2020-35889

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the crayon crate through 2020-08-31 for Rust. A TOCTOU issue has a resultant memory safety violation via HandleLike.
Attacker Value
Unknown

CVE-2020-25860

Disclosure Date: December 21, 2020 (last updated February 22, 2025)
The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.
Attacker Value
Unknown

CVE-2020-27252

Disclosure Date: December 14, 2020 (last updated February 22, 2025)
Medtronic MyCareLink Smart 25000 all versions are vulnerable to a race condition in the MCL Smart Patient Reader software update system, which allows unsigned firmware to be uploaded and executed on the Patient Reader. If exploited an attacker could remotely execute code on the MCL Smart Patient Reader device, leading to control of the device.
Attacker Value
Unknown

CVE-2020-12926

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device.
Attacker Value
Unknown

CVE-2020-8354

Disclosure Date: November 11, 2020 (last updated February 22, 2025)
A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution.