CVE-2018-10769

The transferProxy and approveProxy functions of a smart contract implementation for SmartMesh (SMT), an Ethereum ERC20 token, allow attackers to accomplish an unauthorized transfer of digital assets because replay attacks can occur with the same-named functions (with the same signatures) in other tokens: First (FST), GG Token (GG), M2C Mesh Network (MTC), M2C Mesh Network (mesh), and UG Token (UGT).
Configurations

Configuration 1 (hide)

cpe:2.3:a:smartmesh_project:smartmesh:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:ugtoken_project:ugtoken:-:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:gg_token_project:gg_token:-:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:first_project:first:-:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:mtc_project:mtc:-:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:mesh_project:mesh:-:*:*:*:*:*:*:*

History

07 Nov 2023, 02:51

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'name': '[struts-dev] 20190908 Build failed in Jenkins: Struts-master-JDK8-dependency-check #204', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef%40%3Cdev.struts.apache.org%3E -

Information

Published : 2018-08-10 15:29

Updated : 2024-02-28 16:48


NVD link : CVE-2018-10769

Mitre link : CVE-2018-10769

CVE.ORG link : CVE-2018-10769


JSON object : View

Products Affected

ugtoken_project

  • ugtoken

mtc_project

  • mtc

smartmesh_project

  • smartmesh

gg_token_project

  • gg_token

first_project

  • first

mesh_project

  • mesh