Lucene search

K

Tendermint Security Vulnerabilities

cve
cve

CVE-2019-25072

Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service...

7.5CVSS

7.2AI Score

0.001EPSS

2022-12-27 10:15 PM
31
cve
cve

CVE-2022-23507

Tendermint is a high-performance blockchain consensus engine for Byzantine fault tolerant applications. Versions prior to 0.28.0 contain a potential attack via Improper Verification of Cryptographic Signature, affecting anyone using the tendermint-light-client and related packages to perform light....

6.5CVSS

6.3AI Score

0.001EPSS

2022-12-15 07:15 PM
74
cve
cve

CVE-2021-21271

Tendermint Core is an open source Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine - written in any programming language - and securely replicates it on many machines. Tendermint Core v0.34.0 introduced a new way of handling evidence of misbehavior. As part of this,.....

6.5CVSS

6.3AI Score

0.001EPSS

2021-01-26 09:15 PM
35
1
cve
cve

CVE-2020-15091

TenderMint from version 0.33.0 and before version 0.33.6 allows block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it (without changing chainID). A malicious block proposer (even with a minimal amount...

6.5CVSS

6.1AI Score

0.001EPSS

2020-07-02 05:15 PM
24
cve
cve

CVE-2020-5303

Tendermint before versions 0.33.3, 0.32.10, and 0.31.12 has a denial-of-service vulnerability. Tendermint does not limit the number of P2P connection requests. For each p2p connection, it allocates XXX bytes. Even though this memory is garbage collected once the connection is terminated (due to...

3.7CVSS

4.2AI Score

0.001EPSS

2020-04-10 07:15 PM
112