CVE-2018-10769

The transferProxy and approveProxy functions of a smart contract implementation for SmartMesh (SMT), an Ethereum ERC20 token, allow attackers to accomplish an unauthorized transfer of digital assets because replay attacks can occur with the same-named functions (with the same signatures) in other tokens: First (FST), GG Token (GG), M2C Mesh Network (MTC), M2C Mesh Network (mesh), and UG Token (UGT).
Configurations

Configuration 1

cpe:2.3:a:smartmesh_project:smartmesh:-:*:*:*:*:*:*:*
cpe:2.3:a:ugtoken_project:ugtoken:-:*:*:*:*:*:*:*
cpe:2.3:a:gg_token_project:gg_token:-:*:*:*:*:*:*:*
cpe:2.3:a:first_project:first:-:*:*:*:*:*:*:*
cpe:2.3:a:mtc_project:mtc:-:*:*:*:*:*:*:*
cpe:2.3:a:mesh_project:mesh:-:*:*:*:*:*:*:*

Information

Published : 2018-08-10 03:29

Updated : 2019-10-03 12:03


NVD link : CVE-2018-10769

Mitre link : CVE-2018-10769

Products Affected
No products.