Vulnerabilities > Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

DATE CVE VULNERABILITY TITLE RISK
2018-07-27 CVE-2017-2616 Race Condition vulnerability in multiple products
A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes.
local
high complexity
util-linux-project redhat debian CWE-362
4.7
2018-07-05 CVE-2018-12691 Race Condition vulnerability in Onosproject Onos
Time-of-check to time-of-use (TOCTOU) race condition in org.onosproject.acl (aka the access control application) in ONOS v1.13 and earlier allows attackers to bypass network access control via data plane packet injection.
network
high complexity
onosproject CWE-362
6.8
2018-06-27 CVE-2018-8025 Race Condition vulnerability in Apache Hbase
CVE-2018-8025 describes an issue in Apache HBase that affects the optional "Thrift 1" API server when running over HTTP.
network
high complexity
apache CWE-362
8.1
2018-06-22 CVE-2018-12633 Race Condition vulnerability in Linux Kernel
An issue was discovered in the Linux kernel through 4.17.2.
local
high complexity
linux CWE-362
6.3
2018-06-20 CVE-2018-5236 Race Condition vulnerability in Symantec Endpoint Protection
Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 may be susceptible to a race condition (or race hazard).
network
high complexity
symantec CWE-362
5.3
2018-06-17 CVE-2018-12029 Race Condition vulnerability in multiple products
A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured.
local
high complexity
phusion debian CWE-362
7.0
2018-06-13 CVE-2018-1121 Race Condition vulnerability in Procps Project Procps
procps-ng, procps is vulnerable to a process hiding through race condition.
network
high complexity
procps-project CWE-362
5.9
2018-06-13 CVE-2018-10850 Race Condition vulnerability in multiple products
389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load.
network
high complexity
fedoraproject redhat debian CWE-362
5.9
2018-06-13 CVE-2018-3759 Race Condition vulnerability in Private Address Check Project Private Address Check
private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked.
network
high complexity
private-address-check-project CWE-362
3.7
2018-06-12 CVE-2018-5814 Race Condition vulnerability in multiple products
In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.
local
high complexity
linux debian canonical CWE-362
7.0