** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in blockmason credit-protocol. It has been declared as problematic. Affected by this vulnerability is the function executeUcacTx of the file contracts/CreditProtocol.sol of the component UCAC Handler. The manipulation leads to denial of service. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 082e01f18707ef995e80ebe97fcedb229a55efc5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-252799. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://github.com/blockmason/credit-protocol/commit/082e01f18707ef995e80ebe97fcedb229a55efc5 | Patch |
https://github.com/blockmason/credit-protocol/pull/33 | Issue Tracking Patch |
https://vuldb.com/?ctiid.252799 | Permissions Required |
https://vuldb.com/?id.252799 | Third Party Advisory |
Configurations
History
13 Feb 2024, 00:39
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:blockmason:credit-protocol:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 3.3
v3 : 7.5 |
CWE | CWE-672 | |
First Time |
Blockmason
Blockmason credit-protocol |
|
References | () https://github.com/blockmason/credit-protocol/commit/082e01f18707ef995e80ebe97fcedb229a55efc5 - Patch | |
References | () https://github.com/blockmason/credit-protocol/pull/33 - Issue Tracking, Patch | |
References | () https://vuldb.com/?ctiid.252799 - Permissions Required | |
References | () https://vuldb.com/?id.252799 - Third Party Advisory |
04 Feb 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-04 17:15
Updated : 2024-08-05 13:15
NVD link : CVE-2018-25098
Mitre link : CVE-2018-25098
CVE.ORG link : CVE-2018-25098
JSON object : View
Products Affected
blockmason
- credit-protocol