Vulnerability Description
Integer overflow vulnerability in payable function of a smart contract implementation for an Ethereum token, as demonstrated by the smart contract implemented at address 0xB49E984A83d7A638E7F2889fc8328952BA951AbE, an implementation for MillionCoin (MON).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mon Project | Mon | - |
Related Weaknesses (CWE)
References
- https://etherscan.io/address/0xB49E984A83d7A638E7F2889fc8328952BA951AbEVendor Advisory
- https://github.com/hellowuzekai/blockchains/blob/master/balance.mdExploitThird Party Advisory
- https://etherscan.io/address/0xB49E984A83d7A638E7F2889fc8328952BA951AbEVendor Advisory
- https://github.com/hellowuzekai/blockchains/blob/master/balance.mdExploitThird Party Advisory
FAQ
What is CVE-2020-17752?
CVE-2020-17752 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Integer overflow vulnerability in payable function of a smart contract implementation for an Ethereum token, as demonstrated by the smart contract implemented at address 0xB49E984A83d7A638E7F2889fc832...
How severe is CVE-2020-17752?
CVE-2020-17752 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-17752?
Check the references section above for vendor advisories and patch information. Affected products include: Mon Project Mon.