Vulnerabilities > Ethereum > GO Ethereum
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-12-11 | CVE-2020-26265 | Incorrect Calculation vulnerability in Ethereum GO Ethereum Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. | 5.3 |
2020-12-11 | CVE-2020-26264 | Resource Exhaustion vulnerability in Ethereum GO Ethereum Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. | 6.5 |
2020-11-25 | CVE-2020-26242 | Unspecified vulnerability in Ethereum GO Ethereum Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. | 7.5 |
2020-11-25 | CVE-2020-26241 | Incorrect Calculation vulnerability in Ethereum GO Ethereum Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. | 7.1 |
2020-11-25 | CVE-2020-26240 | Incorrect Calculation vulnerability in Ethereum GO Ethereum Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. | 7.5 |
2018-12-24 | CVE-2018-20421 | Allocation of Resources Without Limits or Throttling vulnerability in Ethereum GO Ethereum 1.8.19 Go Ethereum (aka geth) 1.8.19 allows attackers to cause a denial of service (memory consumption) by rewriting the length of a dynamic array in memory, and then writing data to a single memory location with a large index number, as demonstrated by use of "assembly { mstore }" followed by a "c[0xC800000] = 0xFF" assignment. | 7.5 |
2018-11-12 | CVE-2018-19184 | NULL Pointer Dereference vulnerability in Ethereum GO Ethereum 1.8.17 cmd/evm/runner.go in Go Ethereum (aka geth) 1.8.17 allows attackers to cause a denial of service (SEGV) via crafted bytecode. | 7.5 |
2018-09-08 | CVE-2018-16733 | Improper Input Validation vulnerability in Ethereum GO Ethereum In Go Ethereum (aka geth) before 1.8.14, TraceChain in eth/api_tracer.go does not verify that the end block is after the start block. | 7.5 |
2018-07-05 | CVE-2018-12018 | Improper Validation of Array Index vulnerability in Ethereum GO Ethereum The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value. | 7.5 |