Vulnerabilities > Ethereum > GO Ethereum

DATE CVE VULNERABILITY TITLE RISK
2020-12-11 CVE-2020-26264 Resource Exhaustion vulnerability in Ethereum GO Ethereum
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol.
network
low complexity
ethereum CWE-400
6.5
2020-11-25 CVE-2020-26242 Unspecified vulnerability in Ethereum GO Ethereum
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol.
network
low complexity
ethereum
7.5
2020-11-25 CVE-2020-26241 Unspecified vulnerability in Ethereum GO Ethereum
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol.
network
low complexity
ethereum
7.1
2020-11-25 CVE-2020-26240 Incorrect Calculation vulnerability in Ethereum GO Ethereum
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol.
network
low complexity
ethereum CWE-682
7.5
2018-12-24 CVE-2018-20421 Allocation of Resources Without Limits or Throttling vulnerability in Ethereum GO Ethereum 1.8.19
Go Ethereum (aka geth) 1.8.19 allows attackers to cause a denial of service (memory consumption) by rewriting the length of a dynamic array in memory, and then writing data to a single memory location with a large index number, as demonstrated by use of "assembly { mstore }" followed by a "c[0xC800000] = 0xFF" assignment.
network
low complexity
ethereum CWE-770
7.5
2018-11-12 CVE-2018-19184 NULL Pointer Dereference vulnerability in Ethereum GO Ethereum 1.8.17
cmd/evm/runner.go in Go Ethereum (aka geth) 1.8.17 allows attackers to cause a denial of service (SEGV) via crafted bytecode.
network
low complexity
ethereum CWE-476
7.5
2018-09-08 CVE-2018-16733 Improper Input Validation vulnerability in Ethereum GO Ethereum
In Go Ethereum (aka geth) before 1.8.14, TraceChain in eth/api_tracer.go does not verify that the end block is after the start block.
network
low complexity
ethereum CWE-20
7.5
2018-07-05 CVE-2018-12018 Improper Validation of Array Index vulnerability in Ethereum GO Ethereum
The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value.
network
low complexity
ethereum CWE-129
7.5