Show filters
77 Total Results
Displaying 31-40 of 77
Sort by:
Attacker Value
Unknown
CVE-2021-21615
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.
0
Attacker Value
Unknown
CVE-2020-35889
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the crayon crate through 2020-08-31 for Rust. A TOCTOU issue has a resultant memory safety violation via HandleLike.
0
Attacker Value
Unknown
CVE-2020-25860
Disclosure Date: December 21, 2020 (last updated February 22, 2025)
The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.
0
Attacker Value
Unknown
CVE-2020-27252
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
Medtronic MyCareLink Smart 25000 all versions are vulnerable to a race condition in the MCL Smart Patient Reader software update system, which allows unsigned firmware to be uploaded and executed on the Patient Reader. If exploited an attacker could remotely execute code on the MCL Smart Patient Reader device, leading to control of the device.
0
Attacker Value
Unknown
CVE-2020-12926
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device.
0
Attacker Value
Unknown
CVE-2020-8354
Disclosure Date: November 11, 2020 (last updated February 22, 2025)
A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution.
0
Attacker Value
Unknown
CVE-2020-24428
Disclosure Date: November 03, 2020 (last updated February 22, 2025)
Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a time-of-check time-of-use (TOCTOU) race condition vulnerability that could result in local privilege escalation. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
0
Attacker Value
Unknown
CVE-2020-27014
Disclosure Date: October 30, 2020 (last updated February 22, 2025)
Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash.\n\n\r\nAn attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2020-9921
Disclosure Date: October 22, 2020 (last updated February 22, 2025)
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with system privileges.
0
Attacker Value
Unknown
CVE-2020-9939
Disclosure Date: October 22, 2020 (last updated February 22, 2025)
This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to load unsigned kernel extensions.
0