Show filters
71 Total Results
Displaying 21-30 of 71
Sort by:
Attacker Value
Unknown
CVE-2020-11230
Disclosure Date: March 17, 2021 (last updated February 22, 2025)
Potential arbitrary memory corruption when the qseecom driver updates ion physical addresses in the buffer as it exposes a physical address to user land in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
0
Attacker Value
Unknown
CVE-2021-23977
Disclosure Date: February 26, 2021 (last updated February 22, 2025)
Firefox for Android suffered from a time-of-check-time-of-use vulnerability that allowed a malicious application to read sensitive data from application directories. Note: This issue is only affected Firefox for Android. Other operating systems are unaffected. This vulnerability affects Firefox < 86.
0
Attacker Value
Unknown
CVE-2021-26910
Disclosure Date: February 08, 2021 (last updated February 22, 2025)
Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.
0
Attacker Value
Unknown
CVE-2020-14418
Disclosure Date: January 30, 2021 (last updated February 22, 2025)
A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. This occurs because path redirection can occur via vectors involving directory junctions.
0
Attacker Value
Unknown
CVE-2021-21615
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.
0
Attacker Value
Unknown
CVE-2020-35889
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the crayon crate through 2020-08-31 for Rust. A TOCTOU issue has a resultant memory safety violation via HandleLike.
0
Attacker Value
Unknown
CVE-2020-25860
Disclosure Date: December 21, 2020 (last updated February 22, 2025)
The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.
0
Attacker Value
Unknown
CVE-2020-27252
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
Medtronic MyCareLink Smart 25000 all versions are vulnerable to a race condition in the MCL Smart Patient Reader software update system, which allows unsigned firmware to be uploaded and executed on the Patient Reader. If exploited an attacker could remotely execute code on the MCL Smart Patient Reader device, leading to control of the device.
0
Attacker Value
Unknown
CVE-2020-12926
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device.
0
Attacker Value
Unknown
CVE-2020-8354
Disclosure Date: November 11, 2020 (last updated February 22, 2025)
A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution.
0