Race condition in Lapce v0.2.8 allows an attacker to elevate privileges on the system
References
Link | Resource |
---|---|
https://fluidattacks.com/advisories/aerosmith | Exploit Third Party Advisory |
https://lapce.dev | Product |
https://fluidattacks.com/advisories/aerosmith | Exploit Third Party Advisory |
https://lapce.dev | Product |
Configurations
History
21 Nov 2024, 08:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
References | () https://fluidattacks.com/advisories/aerosmith - Exploit, Third Party Advisory | |
References | () https://lapce.dev - Product |
20 Sep 2023, 18:55
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-367 | |
First Time |
Lapce lapce
Lapce |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
CPE | cpe:2.3:a:lapce:lapce:0.2.8:*:*:*:*:*:*:* | |
References | (MISC) https://fluidattacks.com/advisories/aerosmith - Exploit, Third Party Advisory | |
References | (MISC) https://lapce.dev - Product |
15 Sep 2023, 12:51
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-15 03:15
Updated : 2024-11-21 08:18
NVD link : CVE-2023-3891
Mitre link : CVE-2023-3891
CVE.ORG link : CVE-2023-3891
JSON object : View
Products Affected
lapce
- lapce
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition