Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-4127

Summary
Assigner-@huntrdev
Assigner Org ID-c09c270a-b464-47c1-9133-acb35b22c19a
Published At-03 Aug, 2023 | 03:20
Updated At-10 Oct, 2024 | 20:15
Rejected At-
Credits

Race Condition within a Thread in answerdev/answer

Race Condition within a Thread in GitHub repository answerdev/answer prior to v1.1.1.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:@huntrdev
Assigner Org ID:c09c270a-b464-47c1-9133-acb35b22c19a
Published At:03 Aug, 2023 | 03:20
Updated At:10 Oct, 2024 | 20:15
Rejected At:
▼CVE Numbering Authority (CNA)
Race Condition within a Thread in answerdev/answer

Race Condition within a Thread in GitHub repository answerdev/answer prior to v1.1.1.

Affected Products
Vendor
answerdev
Product
answerdev/answer
Versions
Affected
  • From unspecified before v1.1.1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-366CWE-366 Race Condition within a Thread
Type: CWE
CWE ID: CWE-366
Description: CWE-366 Race Condition within a Thread
Metrics
VersionBase scoreBase severityVector
3.06.5MEDIUM
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Version: 3.0
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba
N/A
https://github.com/answerdev/answer/commit/47661dc8a356ce6aa7793f1bd950399292180182
N/A
Hyperlink: https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba
Resource: N/A
Hyperlink: https://github.com/answerdev/answer/commit/47661dc8a356ce6aa7793f1bd950399292180182
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba
x_transferred
https://github.com/answerdev/answer/commit/47661dc8a356ce6aa7793f1bd950399292180182
x_transferred
Hyperlink: https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba
Resource:
x_transferred
Hyperlink: https://github.com/answerdev/answer/commit/47661dc8a356ce6aa7793f1bd950399292180182
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
answer
Product
answer
CPEs
  • cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 1.1.1 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@huntr.dev
Published At:03 Aug, 2023 | 04:15
Updated At:08 Aug, 2023 | 17:01

Race Condition within a Thread in GitHub repository answerdev/answer prior to v1.1.1.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Secondary3.06.5MEDIUM
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Secondary
Version: 3.0
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CPE Matches

answer
answer
>>answer>>Versions before 1.1.1(exclusive)
cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-366Primarysecurity@huntr.dev
CWE ID: CWE-366
Type: Primary
Source: security@huntr.dev
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/answerdev/answer/commit/47661dc8a356ce6aa7793f1bd950399292180182security@huntr.dev
Patch
https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41basecurity@huntr.dev
Exploit
Patch
Third Party Advisory
Hyperlink: https://github.com/answerdev/answer/commit/47661dc8a356ce6aa7793f1bd950399292180182
Source: security@huntr.dev
Resource:
Patch
Hyperlink: https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba
Source: security@huntr.dev
Resource:
Exploit
Patch
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

1Records found

CVE-2026-23684
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-5.9||MEDIUM
EPSS-0.04% / 10.45%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:02
Updated-17 Feb, 2026 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Race condition vulnerability in SAP Commerce Cloud

A race condition vulnerability exists in the SAP Commerce cloud. Because of this when an attacker adds products to a cart, it may result in a cart entry being created with erroneous product value which could be checked out. This leads to high impact on data integrity, with no impact on data confidentiality or availability of the application.

Action-Not Available
Vendor-SAP SE
Product-commerce_cloudSAP Commerce Cloud
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE ID-CWE-366
Race Condition within a Thread
Details not found