Vulnerabilities (CVE)

Filtered by CWE-362
Total 1700 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-44676 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-03-10 N/A 8.1 HIGH
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVE-2022-41088 1 Microsoft 7 Windows 10, Windows 11, Windows 8.1 and 4 more 2023-03-10 N/A 8.1 HIGH
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-41114 1 Microsoft 3 Windows 10, Windows 11, Windows Server 2022 2023-03-10 N/A 7.0 HIGH
Windows Bind Filter Driver Elevation of Privilege Vulnerability
CVE-2022-41044 1 Microsoft 2 Windows 7, Windows Server 2008 2023-03-10 N/A 8.1 HIGH
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-41090 1 Microsoft 9 Windows 10, Windows 11, Windows 7 and 6 more 2023-03-10 N/A 5.9 MEDIUM
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability
CVE-2022-41100 1 Microsoft 7 Windows 10, Windows 11, Windows 8.1 and 4 more 2023-03-10 N/A 7.8 HIGH
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVE-2022-41093 1 Microsoft 7 Windows 10, Windows 11, Windows 8.1 and 4 more 2023-03-10 N/A 7.8 HIGH
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVE-2022-41045 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-03-10 N/A 7.8 HIGH
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVE-2022-41086 1 Microsoft 9 Windows 10, Windows 11, Windows 7 and 6 more 2023-03-10 N/A 6.4 MEDIUM
Windows Group Policy Elevation of Privilege Vulnerability
CVE-2022-41118 1 Microsoft 9 Windows 10, Windows 11, Windows 7 and 6 more 2023-03-10 N/A 7.5 HIGH
Windows Scripting Languages Remote Code Execution Vulnerability
CVE-2022-41116 1 Microsoft 2 Windows 7, Windows Server 2008 2023-03-10 N/A 5.9 MEDIUM
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability
CVE-2022-46713 1 Apple 1 Macos 2023-03-08 N/A 4.7 MEDIUM
A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13, macOS Monterey 12.6.1, macOS Big Sur 11.7.1. An app may be able to modify protected parts of the file system.
CVE-2022-32764 1 Intel 1 Driver \& Support Assistant 2023-03-06 N/A 7.0 HIGH
Description: Race condition in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2018-5198 1 Wizvera 1 Veraport G3 2023-03-04 6.8 MEDIUM 8.1 HIGH
In Veraport G3 ALL on MacOS, a race condition when calling the Veraport API allow remote attacker to cause arbitrary file download and execution. This results in remote code execution.
CVE-2019-7614 1 Elastic 1 Elasticsearch 2023-03-03 4.3 MEDIUM 5.9 MEDIUM
A race condition flaw was found in the response headers Elasticsearch versions before 7.2.1 and 6.8.2 returns to a request. On a system with multiple users submitting requests, it could be possible for an attacker to gain access to response header containing sensitive data from another user.
CVE-2022-20078 2 Google, Mediatek 13 Android, Mt6833, Mt6853 and 10 more 2023-03-02 6.9 MEDIUM 6.4 MEDIUM
In vow, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05852819; Issue ID: ALPS05852819.
CVE-2023-0739 1 Answer 1 Answer 2023-03-02 N/A 6.8 MEDIUM
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in GitHub repository answerdev/answer prior to 1.0.4.
CVE-2017-2636 2 Debian, Linux 2 Debian Linux, Linux Kernel 2023-02-24 6.9 MEDIUM 7.0 HIGH
Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
CVE-2018-15473 7 Canonical, Debian, Netapp and 4 more 24 Ubuntu Linux, Debian Linux, Aff Baseboard Management Controller and 21 more 2023-02-23 5.0 MEDIUM 5.3 MEDIUM
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2022-3521 2 Debian, Linux 2 Debian Linux, Linux Kernel 2023-02-23 N/A 2.5 LOW
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.