Vulnerabilities > Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

DATE CVE VULNERABILITY TITLE RISK
2025-01-08 CVE-2024-54120 Race Condition vulnerability in Huawei Harmonyos 5.0.0
Race condition vulnerability in the distributed notification module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.
network
high complexity
huawei CWE-362
5.9
2025-01-08 CVE-2024-56441 Race Condition vulnerability in Huawei Emui and Harmonyos
Race condition vulnerability in the Bastet module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
network
high complexity
huawei CWE-362
5.9
2024-12-25 CVE-2024-52906 IBM AIX 7.2, 7.3, VIOS 3.1, and 4.1 could allow a non-privileged local user to exploit a vulnerability in the TCP/IP kernel extension to cause a denial of service.
local
low complexity
CWE-362
5.5
2024-12-12 CVE-2024-54122 Race Condition vulnerability in Huawei Harmonyos 5.0.0
Concurrent variable access vulnerability in the ability module Impact: Successful exploitation of this vulnerability may affect availability.
local
high complexity
huawei CWE-362
4.7
2024-12-12 CVE-2024-54102 Race Condition vulnerability in Huawei Harmonyos 4.2.0/5.0.0
Race condition vulnerability in the DDR module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
network
high complexity
huawei CWE-362
5.9
2024-12-12 CVE-2024-54494 Race Condition vulnerability in Apple products
A race condition was addressed with additional validation.
network
high complexity
apple CWE-362
5.9
2024-12-12 CVE-2024-54510 Race Condition vulnerability in Apple products
A race condition was addressed with improved locking.
local
high complexity
apple CWE-362
5.1
2024-12-12 CVE-2024-49059 Race Condition vulnerability in Microsoft products
Microsoft Office Elevation of Privilege Vulnerability
local
high complexity
microsoft CWE-362
7.0
2024-12-04 CVE-2024-53136 Race Condition vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: mm: revert "mm: shmem: fix data-race in shmem_getattr()" Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as suggested by Chuck [1].
local
high complexity
linux CWE-362
4.7
2024-12-02 CVE-2024-53121 Race Condition vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fs, lock FTE when checking if active The referenced commits introduced a two-step process for deleting FTEs: - Lock the FTE, delete it from hardware, set the hardware deletion function to NULL and unlock the FTE. - Lock the parent flow group, delete the software copy of the FTE, and remove it from the xarray. However, this approach encounters a race condition if a rule with the same match value is added simultaneously.
local
low complexity
linux CWE-362
5.5