Filtered by CWE-367
Total 643 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-22850 1 Intel 1 Uefi Firmware 2026-03-13 N/A
Time-of-check time-of-use race condition in the UEFI PdaSmm module for some Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
CVE-2025-68146 1 Tox-dev 1 Filelock 2026-03-05 6.3 Medium
filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead of UnixFileLock/WindowsFileLock (note: different locking semantics, may not be suitable for all use cases); ensure lock file directories have restrictive permissions (chmod 0700) to prevent untrusted users from creating symlinks; and/or monitor lock file directories for suspicious symlinks before running trusted applications. These workarounds provide only partial mitigation. The race condition remains exploitable. Upgrading to version 3.20.1 is strongly recommended.
CVE-2023-31324 1 Amd 28 Instinct Mi210, Instinct Mi250, Instinct Mi300a and 25 more 2026-03-05 7.8 High
A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed potentially resulting in loss of confidentiality, integrity, or availability.
CVE-2023-20548 1 Amd 28 Instinct Mi210, Instinct Mi250, Instinct Mi300a and 25 more 2026-03-05 7.8 High
A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.
CVE-2024-23463 1 Zscaler 1 Client Connector 2026-03-02 8.8 High
Anti-tampering protection of the Zscaler Client Connector can be bypassed under certain conditions when running the Repair App functionality. This affects Zscaler Client Connector on Windows prior to 4.2.1
CVE-2024-53028 2026-02-26 7.8 High
Memory corruption may occur while processing message from frontend during allocation.
CVE-2024-53032 1 Qualcomm 52 Qam8255p, Qam8255p Firmware, Qam8295p and 49 more 2026-02-26 7.8 High
Memory corruption may occur in keyboard virtual device due to guest VM interaction.
CVE-2025-22224 1 Vmware 5 Cloud Foundation, Esxi, Telco Cloud Infrastructure and 2 more 2026-02-26 9.3 Critical
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
CVE-2025-24036 1 Microsoft 1 Autoupdate 2026-02-26 7 High
Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
CVE-2024-45565 1 Qualcomm 8 Sdm429w, Sdm429w Firmware, Snapdragon 429 Mobile and 5 more 2026-02-26 7.8 High
Memory corruption when blob structure is modified by user-space after kernel verification.
CVE-2024-43067 1 Qualcomm 117 C-v2x 9150, C-v2x 9150 Firmware, Fastconnect 6800 and 114 more 2026-02-26 7.8 High
Memory corruption occurs during the copying of read data from the EEPROM because the IO configuration is exposed as shared memory.
CVE-2025-29969 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-26 7.5 High
Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.
CVE-2025-29833 1 Microsoft 21 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 18 more 2026-02-26 7.7 High
Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally.
CVE-2025-30663 1 Zoom 6 Meeting Software Development Kit, Rooms, Rooms Controller and 3 more 2026-02-26 8.8 High
Time-of-check time-of-use race condition in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via local access.
CVE-2025-21485 1 Qualcomm 58 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 55 more 2026-02-26 7.8 High
Memory corruption while processing INIT and multimode invoke IOCTL calls on FastRPC.
CVE-2025-38352 2 Debian, Linux 2 Debian Linux, Linux Kernel 2026-02-26 7.4 High
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.
CVE-2025-21455 1 Qualcomm 59 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 56 more 2026-02-26 7.8 High
Memory corruption while submitting blob data to kernel space though IOCTL.
CVE-2025-21473 1 Qualcomm 13 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 10 more 2026-02-26 7.8 High
Memory corruption when using Virtual cdm (Camera Data Mover) to write registers.
CVE-2025-53788 1 Microsoft 1 Windows Subsystem For Linux 2026-02-26 7 High
Time-of-check time-of-use (toctou) race condition in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
CVE-2025-49558 1 Adobe 3 Commerce, Commerce B2b, Magento 2026-02-26 5.9 Medium
Adobe Commerce versions 2.4.9-alpha1, 2.4.8-p1, 2.4.7-p6, 2.4.6-p11, 2.4.5-p13, 2.4.4-p14 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability by manipulating the timing between the check of a resource's state and its use, allowing unauthorized write access. Exploitation of this issue does not require user interaction.