Vulnerabilities > Time-of-check Time-of-use (TOCTOU) Race Condition
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-01-30 | CVE-2020-14418 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in multiple products A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. | 7.0 |
2021-01-26 | CVE-2021-21615 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Jenkins Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition. | 5.3 |
2020-12-31 | CVE-2020-35889 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Crayon Project Crayon An issue was discovered in the crayon crate through 2020-08-31 for Rust. | 8.1 |
2020-12-21 | CVE-2020-25860 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Pengutronix Rauc The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. | 6.6 |
2020-12-14 | CVE-2020-27252 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Medtronic Mycarelink Smart Model 25000 Firmware Medtronic MyCareLink Smart 25000 all versions are vulnerable to a race condition in the MCL Smart Patient Reader software update system, which allows unsigned firmware to be uploaded and executed on the Patient Reader. | 8.1 |
2020-11-12 | CVE-2020-12926 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in AMD Trusted Platform Modules Reference The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. | 6.4 |
2020-10-30 | CVE-2020-27014 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Trendmicro Antivirus 2020 Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash.\n\n\r\nAn attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. | 6.4 |
2020-10-22 | CVE-2020-9939 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apple mac OS X This issue was addressed with improved checks. | 6.4 |
2020-10-22 | CVE-2020-9921 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apple mac OS X A memory corruption issue was addressed with improved memory handling. | 7.0 |
2020-10-20 | CVE-2020-3982 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in VMWare products VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. | 7.7 |