Vulnerabilities > Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

DATE CVE VULNERABILITY TITLE RISK
2010-04-01 CVE-2010-1228 Race Condition vulnerability in Google Chrome
Multiple race conditions in the sandbox infrastructure in Google Chrome before 4.1.249.1036 have unspecified impact and attack vectors.
network
low complexity
google CWE-362
critical
10.0
2010-03-31 CVE-2010-0532 Race Condition vulnerability in Apple Itunes
Race condition in the installation package in Apple iTunes before 9.1 on Windows allows local users to gain privileges by replacing an unspecified file with a Trojan horse.
6.9
2010-03-26 CVE-2010-1123 Race Condition vulnerability in Chip Salzenberg Deliver 2.1.14
Chip Salzenberg Deliver does not properly associate a lockfile with the user who created the file, which allows local users to cause a denial of service (blockage of incoming e-mail) by creating lockfiles for arbitrary mailboxes.
local
low complexity
chip-salzenberg CWE-362
2.1
2010-03-03 CVE-2010-0923 Race Condition vulnerability in KDE SC 4.4.0
Race condition in workspace/krunner/lock/lockdlg.cc in the KRunner lock module in kdebase in KDE SC 4.4.0 allows physically proximate attackers to bypass KScreenSaver screen locking and access an unattended workstation by pressing the Enter key at a certain time, related to multiple forked processes.
local
kde CWE-362
6.9
2009-12-28 CVE-2009-4440 Race Condition vulnerability in SUN Java System Directory Server
Directory Proxy Server (DPS) in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3.1 does not properly handle multiple client connections within a short time window, which allows remote attackers to hijack the backend connection of an authenticated user, and obtain the privileges of this user, by making a client connection in opportunistic circumstances, related to "long binds," aka Bug Ids 6828462 and 6823593.
network
sun CWE-362
6.8
2009-12-20 CVE-2009-4029 Race Condition vulnerability in GNU Automake 1.10.3/1.11.1/Branch
The (1) dist or (2) distcheck rules in GNU Automake 1.11.1, 1.10.3, and release branches branch-1-4 through branch-1-9, when producing a distribution tarball for a package that uses Automake, assign insecure permissions (777) to directories in the build tree, which introduces a race condition that allows local users to modify the contents of package files, introduce Trojan horse programs, or conduct other attacks before the build is complete.
local
gnu CWE-362
4.4
2009-12-14 CVE-2009-4129 Race Condition vulnerability in Mozilla Firefox
Race condition in Mozilla Firefox allows remote attackers to produce a JavaScript message with a spoofed domain association by writing the message in between the document request and document load for a web page in a different domain.
network
mozilla CWE-362
5.8
2009-12-08 CVE-2009-4226 Race Condition vulnerability in SUN Opensolaris
Race condition in the IP module in the kernel in Sun OpenSolaris snv_106 through snv_124 allows remote attackers to cause a denial of service (NULL pointer dereference and panic) via unspecified vectors related to the (1) tcp_do_getsockname or (2) tcp_do_getpeername function.
network
sun CWE-362
7.1
2009-11-20 CVE-2005-4883 Race Condition vulnerability in Philippe Jounin Tftpd32
Race condition in Philippe Jounin Tftpd32 before 2.80 allows remote attackers to cause a denial of service (daemon crash) via invalid "connect frames."
4.3
2009-11-10 CVE-2009-2836 Race Condition vulnerability in Apple mac OS X and mac OS X Server
Race condition in Login Window in Apple Mac OS X 10.6.x before 10.6.2, when at least one account has a blank password, allows attackers to bypass password authentication and obtain login access to an arbitrary account via unspecified vectors.
local
high complexity
apple CWE-362
6.2