CVE-2018-10769
10.08.2018, 15:29
The transferProxy and approveProxy functions of a smart contract implementation for SmartMesh (SMT), an Ethereum ERC20 token, allow attackers to accomplish an unauthorized transfer of digital assets because replay attacks can occur with the same-named functions (with the same signatures) in other tokens: First (FST), GG Token (GG), M2C Mesh Network (MTC), M2C Mesh Network (mesh), and UG Token (UGT).Enginsight
Vendor | Product | Version |
---|---|---|
smartmesh_project | smartmesh | - |
ugtoken_project | ugtoken | - |
gg_token_project | gg_token | - |
first_project | first | - |
mtc_project | mtc | - |
mesh_project | mesh | - |
𝑥
= Vulnerable software versions
References