Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-06-25 CVE-2018-12070 Integer Overflow or Wraparound vulnerability in SEC Project SEC
The sell function of a smart contract implementation for SEC, a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka the "tradeTrap" issue.
network
low complexity
sec-project CWE-190
7.5
2018-06-25 CVE-2018-12068 Integer Overflow or Wraparound vulnerability in Tgtcoins Target Coin
The sell function of a smart contract implementation for Target Coin (TGT), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka the "tradeTrap" issue.
network
low complexity
tgtcoins CWE-190
7.5
2018-06-25 CVE-2018-12067 Integer Overflow or Wraparound vulnerability in Substratum
The sell function of a smart contract implementation for Substratum (SUB), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka the "tradeTrap" issue.
network
low complexity
substratum CWE-190
7.5
2018-06-25 CVE-2018-12063 Integer Overflow or Wraparound vulnerability in Intchain Node Token
The sell function of a smart contract implementation for Internet Node Token (INT), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka the "tradeTrap" issue.
network
low complexity
intchain CWE-190
7.5
2018-06-25 CVE-2018-12062 Integer Overflow or Wraparound vulnerability in Swft Swftcoin
The sell function of a smart contract implementation for SwftCoin (SWFTC), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka the "tradeTrap" issue.
network
low complexity
swft CWE-190
7.5
2018-06-25 CVE-2018-11446 Integer Overflow or Wraparound vulnerability in Gold Reward Project Gold Reward
The buy function of a smart contract implementation for Gold Reward (GRX), an Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the buyer because of overflow of the multiplication of its argument amount and a manipulable variable buyPrice, aka the "tradeTrap" issue.
network
low complexity
gold-reward-project CWE-190
7.5
2018-06-25 CVE-2018-12703 Improper Input Validation vulnerability in Block18
The approveAndCallcode function of a smart contract implementation for Block 18 (18T), an tradable Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer the contract's balances into their account) because the callcode (i.e., _spender.call(_extraData)) is not verified, aka the "evilReflex" issue.
network
low complexity
block18 CWE-20
7.5
2018-06-25 CVE-2018-12702 Improper Input Validation vulnerability in GVE Globalvillage Ecosystem
The approveAndCallcode function of a smart contract implementation for Globalvillage ecosystem (GVE), an Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer the contract's balances into their account) because the callcode (i.e., _spender.call(_extraData)) is not verified, aka the "evilReflex" issue.
network
low complexity
gve CWE-20
7.5
2018-06-23 CVE-2018-12698 demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call.
network
low complexity
gnu canonical
7.5
2018-06-23 CVE-2018-12697 NULL Pointer Dereference vulnerability in multiple products
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30.
network
low complexity
gnu canonical CWE-476
7.5