We found results for “”
CVE-2024-27094
Good to know:
Date: February 29, 2024
OpenZeppelin Contracts is a library for secure smart contract development. The "Base64.encode" function encodes a "bytes" input by iterating over it in chunks of 3 bytes. When this input is not a multiple of 3, the last iteration may read parts of the memory that are beyond the input buffer. The vulnerability is fixed in 5.0.2 and 4.9.6.
Language: JS
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
Out-of-bounds Read
CWE-125Top Fix
Upgrade Version
Upgrade to version @openzeppelin/contracts - 4.9.6;@openzeppelin/contracts - 5.0.2;@openzeppelin/contracts-upgradeable - 4.9.6;@openzeppelin/contracts-upgradeable - 5.0.2
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | LOW |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


