Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
race condition vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-4302
Multiple race conditions in certain system call wrappers in Generic Software Wrappers Toolkit (GSWTK) allow local users to defeat system call interposition and possibly gain privileges or bypass auditing.
Freshmeat Generic Software Wrappers Toolkit 1.6.3
1 EDB exploit
NA
CVE-2009-0784
Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to insert arbitrary SystemTap kernel modules and gain privileges via unknown vectors.
Systemtap Systemtap 0.0.20080705
Systemtap Systemtap 0.0.20090314
Debian Debian Linux 4.0
Debian Debian Linux 5.0
NA
CVE-2023-27359
TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. This vulnerability allows remote malicious users to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability. The sp...
7.8
CVSSv3
CVE-2021-44731
A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local malicious user to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing sna...
Canonical Snapd
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 21.10
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Debian Debian Linux 10.0
Debian Debian Linux 11.0
1 Github repository
NA
CVE-2011-4089
The bzexe command in bzip2 1.0.5 and previous versions generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.
Bzip Bzip2 1.0
Bzip Bzip2 1.0.3
Bzip Bzip2
Bzip Bzip2 1.0.2
Bzip Bzip2 1.0.1
1 EDB exploit
NA
CVE-2023-32246
This vulnerability allows local attackers to execute arbitrary code on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within th...
NA
CVE-2023-32256
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable. The specific flaw exists within the processing...
NA
CVE-2012-1174
The rm_rf_children function in util.c in the systemd-logind login manager in systemd prior to 44, when logging out, allows local users to delete arbitrary files via a symlink attack on unspecified files, related to "particular records related with user session."
Linux Systemd 43
NA
CVE-2005-0953
Race condition in bzip2 1.0.2 and previous versions allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.
Bzip Bzip2 0.9.5 D
Bzip Bzip2 0.9 A
Bzip Bzip2 0.9
Bzip Bzip2 0.9.5 A
Bzip Bzip2 1.0
Bzip Bzip2 1.0.1
Bzip Bzip2 1.0.2
Bzip Bzip2 0.9.5 B
Bzip Bzip2 0.9.5 C
Bzip Bzip2 0.9 B
Bzip Bzip2 0.9 C
7
CVSSv3
CVE-2022-3328
Race condition in snap-confine's must_mkdir_and_open_with_perms()
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 22.10
Canonical Snapd
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »