Skip to content
Threat Feed

Tag

Race Condition

15 briefs RSS
medium advisory

CVE-2025-68146 filelock TOCTOU Race Condition Enables Symlink Attacks

CVE-2025-68146 describes a Time-of-Check Time-of-Use (TOCTOU) race condition vulnerability in the filelock library that could allow for symlink attacks during lock file creation, potentially leading to unauthorized file access or modification.

TOCTOU symlink filelock CVE-2025-68146 race condition
2r 1c
high advisory

Windows User Interface Core Race Condition Privilege Escalation (CVE-2026-27911)

CVE-2026-27911 is a race condition vulnerability in the Windows User Interface Core that allows a local attacker to elevate privileges due to improper synchronization when accessing shared resources.

privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Windows TCP/IP Race Condition Vulnerability (CVE-2026-33827)

CVE-2026-33827 is a race condition vulnerability in Windows TCP/IP that allows an attacker to execute arbitrary code over the network by exploiting improper synchronization during concurrent execution using shared resources.

cve-2026-33827 race-condition windows tcp/ip code-execution
2r 2t 1c
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32160)

CVE-2026-32160 describes a race condition vulnerability in Windows Push Notifications that allows a locally authorized attacker to elevate privileges.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32158)

CVE-2026-32158 is a race condition vulnerability in Windows Push Notifications that allows an authorized attacker to elevate privileges locally due to improper synchronization when using shared resources.

privilege escalation race condition windows
2r 1t 1c 1i
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-26172)

CVE-2026-26172 is a race condition vulnerability in Windows Push Notifications, allowing a locally authenticated attacker to elevate privileges.

cve-2026-26172 privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Windows Projected File System Race Condition Privilege Escalation (CVE-2026-27927)

CVE-2026-27927 is a race condition vulnerability in the Windows Projected File System that allows an authorized attacker to escalate privileges locally.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

CVE-2026-27926 Windows Cloud Files Mini Filter Driver Privilege Escalation

CVE-2026-27926 is a race condition vulnerability in the Windows Cloud Files Mini Filter Driver that allows a local attacker to elevate privileges.

privilege-escalation race-condition windows
3r 1t 1c
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32159)

CVE-2026-32159 is a race condition vulnerability in Windows Push Notifications, allowing a local attacker with low privileges to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.

privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Microsoft Brokering File System Race Condition Vulnerability (CVE-2026-32091)

CVE-2026-32091 is a race condition vulnerability in the Microsoft Brokering File System, allowing an unauthenticated local attacker to escalate privileges.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

Windows Shell Race Condition Vulnerability (CVE-2026-27918)

CVE-2026-27918 is a race condition vulnerability in Windows Shell, allowing a local attacker to elevate privileges due to improper synchronization when accessing shared resources.

race-condition privilege-escalation windows
2r 1t 1c
high advisory

Lakeside SysTrack Agent Local Privilege Escalation via Race Condition (CVE-2026-35099)

Lakeside SysTrack Agent 11 before 11.2.1.28 is vulnerable to a race condition that allows for local privilege escalation to SYSTEM, as tracked by CVE-2026-35099.

lakeside systrack privilege-escalation race-condition cve-2026-35099 windows
2r 1t 1c
critical threat

Critical Vulnerabilities in NetScaler ADC and Gateway Allow Sensitive Data Exposure and Session Hijacking

Unauthenticated attackers can exploit CVE-2026-3055 (out-of-bounds read) to exfiltrate sensitive data from NetScaler ADC and Gateway, while CVE-2026-4368 (race condition) enables user session hijacking, necessitating immediate patching and enhanced monitoring.

exploited netscaler cve-2026-3055 cve-2026-4368 out-of-bounds read race condition memory corruption session hijacking
2r 1t 2c
high advisory

RegPwnBOF Registry Symlink Race Condition Exploit

RegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.

registry symlink race-condition accessibility privilege-escalation persistence windows
2r 2t
high advisory

OpenClaw Symlink Race Condition Allows Sandbox Escape

A time-of-check/time-of-use (TOCTOU) race condition in OpenClaw versions 2026.4.21 and earlier allows a symlink swap to redirect filesystem writes outside the intended sandbox mount root, potentially leading to arbitrary file modification.

openclaw sandbox-escape symlink race-condition npm
1r 1t