Show filters
49 Total Results
Displaying 11-20 of 49
Sort by:
Attacker Value
Unknown
CVE-2021-42219
Disclosure Date: March 17, 2022 (last updated October 07, 2023)
Go-Ethereum v1.10.9 was discovered to contain an issue which allows attackers to cause a denial of service (DoS) via sending an excessive amount of messages to a node. This is caused by missing memory in the component /ethash/algorithm.go.
0
Attacker Value
Unknown
CVE-2022-23328
Disclosure Date: March 04, 2022 (last updated February 23, 2025)
A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).
0
Attacker Value
Unknown
CVE-2022-23327
Disclosure Date: March 04, 2022 (last updated October 07, 2023)
A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS).
0
Attacker Value
Unknown
CVE-2021-43668
Disclosure Date: November 18, 2021 (last updated February 23, 2025)
Go-Ethereum 1.10.9 nodes crash (denial of service) after receiving a serial of messages and cannot be recovered. They will crash with "runtime error: invalid memory address or nil pointer dereference" and arise a SEGV signal.
0
Attacker Value
Unknown
CVE-2021-41173
Disclosure Date: October 26, 2021 (last updated February 23, 2025)
Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.9, a vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer. Version v1.10.9 contains patches to the vulnerability. There are no known workarounds aside from upgrading.
0
Attacker Value
Unknown
CVE-2021-42764
Disclosure Date: October 20, 2021 (last updated November 28, 2024)
The Proof-of-Stake (PoS) Ethereum consensus protocol through 2021-10-19 allows an adversary to cause a denial of service (delayed consensus decisions), and also increase the profits of individual validators, via short-range reorganizations of the underlying consensus chain.
0
Attacker Value
Unknown
CVE-2021-42766
Disclosure Date: October 20, 2021 (last updated November 28, 2024)
The Proof-of-Stake (PoS) Ethereum consensus protocol through 2021-10-19 allows an adversary to cause a denial of service (long-range consensus chain reorganizations), even when this adversary has little stake and cannot influence network message propagation. This can cause a protocol stall, or an increase in the profits of individual validators.
0
Attacker Value
Unknown
CVE-2021-42765
Disclosure Date: October 20, 2021 (last updated November 28, 2024)
The Proof-of-Stake (PoS) Ethereum consensus protocol through 2021-10-19 allows an adversary to leverage network delay to cause a denial of service (indefinite stalling of consensus decisions).
0
Attacker Value
Unknown
CVE-2021-39137
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
go-ethereum is the official Go implementation of the Ethereum protocol. In affected versions a consensus-vulnerability in go-ethereum (Geth) could cause a chain split, where vulnerable versions refuse to accept the canonical chain. Further details about the vulnerability will be disclosed at a later date. A patch is included in the upcoming `v1.10.8` release. No workaround are available.
0
Attacker Value
Unknown
CVE-2020-26800
Disclosure Date: January 11, 2021 (last updated February 22, 2025)
A stack overflow vulnerability in Aleth Ethereum C++ client version <= 1.8.0 using a specially crafted a config.json file may result in a denial of service.
0