Описание
An integer overflow in the transferProxy function of a smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets via crafted _fee and _value parameters, as exploited in the wild in April 2018, aka the "proxyOverflow" issue.
Ссылки
- Not Applicable
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Not Applicable
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:smartmesh:smartmesh:-:*:*:*:*:*:*:*
EPSS
Процентиль: 50%
0.00267
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-190
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
An integer overflow in the transferProxy function of a smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets via crafted _fee and _value parameters, as exploited in the wild in April 2018, aka the "proxyOverflow" issue.
EPSS
Процентиль: 50%
0.00267
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-190