The transferProxy and approveProxy functions of a smart contract implementation for SmartMesh (SMT), an Ethereum ERC20 token, allow attackers to accomplish an unauthorized transfer of digital assets because replay attacks can occur with the same-named functions (with the same signatures) in other tokens: First (FST), GG Token (GG), M2C Mesh Network (MTC), M2C Mesh Network (mesh), and UG Token (UGT).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
07 Nov 2023, 02:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-08-10 15:29
Updated : 2024-02-28 16:48
NVD link : CVE-2018-10769
Mitre link : CVE-2018-10769
CVE.ORG link : CVE-2018-10769
JSON object : View
Products Affected
ugtoken_project
- ugtoken
mtc_project
- mtc
smartmesh_project
- smartmesh
gg_token_project
- gg_token
first_project
- first
mesh_project
- mesh
CWE