Vulnerabilities > Time-of-check Time-of-use (TOCTOU) Race Condition

DATE CVE VULNERABILITY TITLE RISK
2021-03-17 CVE-2020-11220 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Qualcomm products
While processing storage SCM commands there is a time of check or time of use window where a pointer used could be invalid at a specific time while executing the storage SCM call in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
local
high complexity
qualcomm CWE-367
6.4
2021-02-26 CVE-2021-23977 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Mozilla Firefox
Firefox for Android suffered from a time-of-check-time-of-use vulnerability that allowed a malicious application to read sensitive data from application directories.
network
high complexity
mozilla CWE-367
5.3
2021-02-08 CVE-2021-26910 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in multiple products
Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.
local
high complexity
firejail-project debian CWE-367
7.0
2021-01-30 CVE-2020-14418 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in multiple products
A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM.
local
high complexity
morphisec madshi cisco CWE-367
7.0
2021-01-26 CVE-2021-21615 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Jenkins
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.
network
high complexity
jenkins CWE-367
5.3
2020-12-31 CVE-2020-35889 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Crayon Project Crayon
An issue was discovered in the crayon crate through 2020-08-31 for Rust.
network
high complexity
crayon-project CWE-367
8.1
2020-12-21 CVE-2020-25860 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Pengutronix Rauc
The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation.
network
high complexity
pengutronix CWE-367
6.6
2020-12-14 CVE-2020-27252 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Medtronic Mycarelink Smart Model 25000 Firmware
Medtronic MyCareLink Smart 25000 all versions are vulnerable to a race condition in the MCL Smart Patient Reader software update system, which allows unsigned firmware to be uploaded and executed on the Patient Reader.
network
high complexity
medtronic CWE-367
8.1
2020-11-12 CVE-2020-12926 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in AMD Trusted Platform Modules Reference
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens.
high complexity
amd CWE-367
6.4
2020-10-30 CVE-2020-27014 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Trendmicro Antivirus 2020
Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash.\n\n\r\nAn attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
local
high complexity
trendmicro CWE-367
6.4