Vulnerabilities > Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-05-20 | CVE-2020-15522 | Race Condition vulnerability in Bouncycastle products Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures. | 4.3 |
2021-05-19 | CVE-2021-27925 | Race Condition vulnerability in Couchbase Server An issue was discovered in Couchbase Server 6.5.x and 6.6.x through 6.6.1. | 3.5 |
2021-05-13 | CVE-2021-20181 | Race Condition vulnerability in multiple products A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. | 7.5 |
2021-05-13 | CVE-2021-32921 | Race Condition vulnerability in multiple products An issue was discovered in Prosody before 0.11.9. | 5.9 |
2021-05-10 | CVE-2021-32399 | Race Condition vulnerability in multiple products net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller. | 4.4 |
2021-04-22 | CVE-2021-0258 | Race Condition vulnerability in Juniper Junos 17.2/17.3/17.4 A vulnerability in the forwarding of transit TCPv6 packets received on the Ethernet management interface of Juniper Networks Junos OS allows an attacker to trigger a kernel panic, leading to a Denial of Service (DoS). | 7.1 |
2021-04-22 | CVE-2021-0247 | Race Condition vulnerability in Juniper Junos 14.1X53/15.1X53 A Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) vulnerability in the firewall process (dfwd) of Juniper Networks Junos OS allows an attacker to bypass the firewall rule sets applied to the input loopback filter on any interfaces of a device. | 6.8 |
2021-04-22 | CVE-2021-0244 | Race Condition vulnerability in Juniper Junos 14.1X53/15.1 A signal handler race condition exists in the Layer 2 Address Learning Daemon (L2ALD) of Juniper Networks Junos OS due to the absence of a specific protection mechanism to avoid a race condition which may allow an attacker to bypass the storm-control feature on devices. | 4.3 |
2021-04-22 | CVE-2021-23133 | Race Condition vulnerability in multiple products A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. | 7.0 |
2021-04-13 | CVE-2021-0443 | Race Condition vulnerability in Google Android In several functions of ScreenshotHelper.java and related files, there is a possible incorrectly saved screenshot due to a race condition. | 1.9 |