Vulnerabilities (CVE)

Filtered by CWE-366
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-2032 2024-06-07 N/A 3.1 LOW
A race condition vulnerability exists in zenml-io/zenml versions up to and including 0.55.3, which allows for the creation of multiple users with the same username when requests are sent in parallel. This issue was fixed in version 0.55.5. The vulnerability arises due to insufficient handling of concurrent user creation requests, leading to data inconsistencies and potential authentication problems. Specifically, concurrent processes may overwrite or corrupt user data, complicating user identification and posing security risks. This issue is particularly concerning for APIs that rely on usernames as input parameters, such as PUT /api/v1/users/test_race, where it could lead to further complications.
CVE-2015-10067 1 Ssharpsmartthreadpool Project 1 Ssharpsmartthreadpool 2024-05-17 4.0 MEDIUM 8.1 HIGH
A vulnerability was found in oznetmaster SSharpSmartThreadPool. It has been classified as problematic. This affects an unknown part of the file SSharpSmartThreadPool/SmartThreadPool.cs. The manipulation leads to race condition within a thread. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 0e58073c831093aad75e077962e9fb55cad0dc5f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218463.
CVE-2023-4127 1 Answer 1 Answer 2024-02-05 N/A 5.9 MEDIUM
Race Condition within a Thread in GitHub repository answerdev/answer prior to v1.1.1.
CVE-2023-3218 2024-02-04 N/A 4.4 MEDIUM
Race Condition within a Thread in GitHub repository it-novum/openitcockpit prior to 4.6.5.