Vulnerabilities (CVE)

Filtered by CWE-362
Total 1495 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-26828 1 Microsoft 4 Windows 10, Windows Server 2016, Windows Server 2019 and 1 more 2023-06-29 4.4 MEDIUM 7.0 HIGH
Windows Bluetooth Driver Elevation of Privilege Vulnerability
CVE-2022-26827 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-06-29 6.9 MEDIUM 7.0 HIGH
Windows File Server Resource Management Service Elevation of Privilege Vulnerability
CVE-2022-26822 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2023-06-29 8.5 HIGH 6.6 MEDIUM
Windows DNS Server Remote Code Execution Vulnerability
CVE-2022-26821 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2023-06-29 8.5 HIGH 6.6 MEDIUM
Windows DNS Server Remote Code Execution Vulnerability
CVE-2022-26820 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2023-06-29 8.5 HIGH 6.6 MEDIUM
Windows DNS Server Remote Code Execution Vulnerability
CVE-2022-26819 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2023-06-29 8.5 HIGH 6.6 MEDIUM
Windows DNS Server Remote Code Execution Vulnerability
CVE-2022-26817 1 Microsoft 4 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 1 more 2023-06-29 8.5 HIGH 6.6 MEDIUM
Windows DNS Server Remote Code Execution Vulnerability
CVE-2022-26814 1 Microsoft 4 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 1 more 2023-06-29 8.5 HIGH 6.6 MEDIUM
Windows DNS Server Remote Code Execution Vulnerability
CVE-2022-26808 1 Microsoft 8 Windows 10, Windows 11, Windows 8.1 and 5 more 2023-06-29 4.4 MEDIUM 7.0 HIGH
Windows File Explorer Elevation of Privilege Vulnerability
CVE-2022-26807 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-06-29 4.4 MEDIUM 7.0 HIGH
Windows Work Folder Service Elevation of Privilege Vulnerability
CVE-2022-24540 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-06-29 4.4 MEDIUM 7.0 HIGH
Windows ALPC Elevation of Privilege Vulnerability
CVE-2022-24537 1 Microsoft 6 Windows 10, Windows 11, Windows Server and 3 more 2023-06-29 6.9 MEDIUM 7.8 HIGH
Windows Hyper-V Remote Code Execution Vulnerability
CVE-2022-24482 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2023-06-29 4.4 MEDIUM 7.0 HIGH
Windows ALPC Elevation of Privilege Vulnerability
CVE-2022-22008 1 Microsoft 7 Windows 10, Windows 11, Windows 8.1 and 4 more 2023-06-29 6.9 MEDIUM 7.8 HIGH
Windows Hyper-V Remote Code Execution Vulnerability
CVE-2022-2961 3 Fedoraproject, Linux, Netapp 12 Fedora, Linux Kernel, H300s and 9 more 2023-06-28 N/A 7.0 HIGH
A use-after-free flaw was found in the Linux kernel’s PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CVE-2023-21031 1 Google 1 Android 2023-06-28 N/A 4.7 MEDIUM
In setPowerMode of HWC2.cpp, there is a possible out of bounds read due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-242688355
CVE-2022-22208 1 Juniper 2 Junos, Junos Os Evolved 2023-06-27 N/A 5.9 MEDIUM
A Use After Free vulnerability in the Routing Protocol Daemon (rdp) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service (DoS). When a BGP session flap happens, a Use After Free of a memory location that was assigned to another object can occur, which will lead to an rpd crash. This is a race condition that is outside of the attacker's control and cannot be deterministically exploited. Continued flapping of BGP sessions can create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: All versions prior to 18.4R2-S9, 18.4R3-S11; 19.1 versions prior to 19.1R3-S8; 19.2 version 19.2R1 and later versions; 19.3 versions prior to 19.3R3-S5; 19.4 versions prior to 19.4R2-S6, 19.4R3-S6; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R2-S1, 21.2R3. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S4-EVO; 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO.
CVE-2017-1000405 1 Linux 1 Linux Kernel 2023-06-26 6.9 MEDIUM 7.0 HIGH
The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()'s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original "Dirty cow" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp.
CVE-2023-21095 1 Google 1 Android 2023-06-22 N/A 4.7 MEDIUM
In canStartSystemGesture of RecentsAnimationDeviceState.java, there is a possible partial lockscreen bypass due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-242704576
CVE-2017-17712 1 Linux 1 Linux Kernel 2023-06-21 6.9 MEDIUM 7.0 HIGH
The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.