Vulnerabilities > Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

DATE CVE VULNERABILITY TITLE RISK
2014-08-07 CVE-2014-5195 Race Condition vulnerability in Ayatana Project Unity
Unity before 7.2.3 and 7.3.x before 7.3.1, as used in Ubuntu, does not properly take focus of the keyboard when switching to the lock screen, which allows physically proximate attackers to bypass the lock screen by (1) leveraging a machine that had text selected when locking or (2) resuming from a suspension.
local
low complexity
ayatana-project canonical CWE-362
7.2
2014-07-24 CVE-2014-1419 Race Condition vulnerability in Canonical Acpi-Support and Ubuntu Linux
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.
6.9
2014-06-05 CVE-2014-3940 Race Condition vulnerability in multiple products
The Linux kernel through 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering a race condition via numa_maps read operations during hugepage migration, related to fs/proc/task_mmu.c and mm/mempolicy.c.
local
high complexity
redhat linux CWE-362
4.0
2014-05-02 CVE-2014-1441 Race Condition vulnerability in Coreftp Core FTP 1.2
Core FTP Server 1.2 before build 515 allows remote attackers to cause a denial of service (reachable assertion and crash) via an AUTH SSL command with malformed data, as demonstrated by pressing the enter key twice.
network
coreftp CWE-362
4.3
2014-04-14 CVE-2010-5298 Race Condition vulnerability in multiple products
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
network
high complexity
openssl mariadb fedoraproject suse CWE-362
4.0
2014-04-11 CVE-2014-2848 Race Condition vulnerability in Tenable Nessus and Plugin-Set
A race condition in the wmi_malware_scan.nbin plugin before 201402262215 for Nessus 5.2.1 allows local users to gain privileges by replacing the dissolvable agent executable in the Windows temp directory with a Trojan horse program.
6.9
2014-03-31 CVE-2014-0062 Race Condition vulnerability in Postgresql
Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.
4.9
2014-03-06 CVE-2014-0703 Race Condition vulnerability in Cisco products
Cisco Wireless LAN Controller (WLC) devices 7.4 before 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote attackers to bypass intended access restrictions by connecting to an Aironet access point on which this server had been disabled ineffectively, aka Bug ID CSCuf66202.
network
low complexity
cisco CWE-362
critical
10.0
2014-02-22 CVE-2014-0710 Race Condition vulnerability in Cisco Firewall Services Module Software
Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824.
network
cisco CWE-362
7.1
2014-02-14 CVE-2014-1921 Race Condition vulnerability in Parcimonie Project Parcimonie 0.61/0.63/0.71
parcimonie before 0.8.1, when using a large keyring, sleeps for the same amount of time between fetches, which allows attackers to correlate key fetches via unspecified vectors.
network
low complexity
parcimonie-project CWE-362
7.5