Vulnerabilities > Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

DATE CVE VULNERABILITY TITLE RISK
2024-08-15 CVE-2024-34731 Race Condition vulnerability in Google Android
In multiple functions of TranscodingResourcePolicy.cpp, there is a possible memory corruption due to a race condition.
local
high complexity
google CWE-362
7.0
2024-08-15 CVE-2024-42488 Race Condition vulnerability in Cilium
Cilium is a networking, observability, and security solution with an eBPF-based dataplane.
network
high complexity
cilium CWE-362
6.8
2024-08-13 CVE-2024-38136 Race Condition vulnerability in Microsoft products
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
local
high complexity
microsoft CWE-362
7.0
2024-08-13 CVE-2024-38137 Race Condition vulnerability in Microsoft products
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
local
high complexity
microsoft CWE-362
7.0
2024-08-12 CVE-2024-7589 Race Condition vulnerability in Freebsd
A signal handler in sshd(8) may call a logging function that is not async-signal-safe.
network
high complexity
freebsd CWE-362
8.1
2024-08-06 CVE-2024-6996 Race Condition vulnerability in Google Chrome
Race in Frames in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page.
network
high complexity
google CWE-362
3.1
2024-07-29 CVE-2024-27823 Race Condition vulnerability in Apple products
A race condition was addressed with improved locking.
network
high complexity
apple CWE-362
5.9
2024-07-29 CVE-2024-40815 Race Condition vulnerability in Apple products
A race condition was addressed with additional validation.
network
high complexity
apple CWE-362
7.5
2024-07-29 CVE-2023-42959 Race Condition vulnerability in Apple Macos
A race condition was addressed with improved state handling.
local
high complexity
apple CWE-362
7.0
2024-07-16 CVE-2022-48784 Race Condition vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: cfg80211: fix race in netlink owner interface destruction My previous fix here to fix the deadlock left a race where the exact same deadlock (see the original commit referenced below) can still happen if cfg80211_destroy_ifaces() already runs while nl80211_netlink_notify() is still marking some interfaces as nl_owner_dead. The race happens because we have two loops here - first we dev_close() all the netdevs, and then we destroy them.
local
high complexity
linux CWE-362
4.7