Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-58263

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-27 Jul, 2025 | 00:00
Updated At-28 Jul, 2025 | 18:55
Rejected At-
Credits

The cosmwasm-std crate before 2.0.2 for Rust allows integer overflows that cause incorrect contract calculations.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:27 Jul, 2025 | 00:00
Updated At:28 Jul, 2025 | 18:55
Rejected At:
▼CVE Numbering Authority (CNA)

The cosmwasm-std crate before 2.0.2 for Rust allows integer overflows that cause incorrect contract calculations.

Affected Products
Vendor
CosmWasm
Product
cosmwasm-std
Default Status
unaffected
Versions
Affected
  • From 1.3.0 before 1.4.4 (semver)
  • From 1.5.0 before 1.5.4 (semver)
  • From 2.0.0 before 2.0.2 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-190CWE-190 Integer Overflow or Wraparound
Type: CWE
CWE ID: CWE-190
Description: CWE-190 Integer Overflow or Wraparound
Metrics
VersionBase scoreBase severityVector
3.13.7LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Version: 3.1
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://rustsec.org/advisories/RUSTSEC-2024-0338.html
N/A
https://github.com/CosmWasm/advisories/blob/main/CWAs/CWA-2024-002.md
N/A
https://crates.io/crates/cosmwasm-std
N/A
Hyperlink: https://rustsec.org/advisories/RUSTSEC-2024-0338.html
Resource: N/A
Hyperlink: https://github.com/CosmWasm/advisories/blob/main/CWAs/CWA-2024-002.md
Resource: N/A
Hyperlink: https://crates.io/crates/cosmwasm-std
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:27 Jul, 2025 | 20:15
Updated At:07 Aug, 2025 | 15:01

The cosmwasm-std crate before 2.0.2 for Rust allows integer overflows that cause incorrect contract calculations.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.13.7LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CPE Matches

cosmwasm
cosmwasm
>>cosmwasm-std>>Versions from 1.3.0(inclusive) to 1.4.4(exclusive)
cpe:2.3:a:cosmwasm:cosmwasm-std:*:*:*:*:*:rust:*:*
cosmwasm
cosmwasm
>>cosmwasm-std>>Versions from 1.5.0(inclusive) to 1.5.4(exclusive)
cpe:2.3:a:cosmwasm:cosmwasm-std:*:*:*:*:*:rust:*:*
cosmwasm
cosmwasm
>>cosmwasm-std>>Versions from 2.0.0(inclusive) to 2.0.2(exclusive)
cpe:2.3:a:cosmwasm:cosmwasm-std:*:*:*:*:*:rust:*:*
Weaknesses
CWE IDTypeSource
CWE-190Primarycve@mitre.org
CWE ID: CWE-190
Type: Primary
Source: cve@mitre.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://crates.io/crates/cosmwasm-stdcve@mitre.org
Product
https://github.com/CosmWasm/advisories/blob/main/CWAs/CWA-2024-002.mdcve@mitre.org
Exploit
Patch
Third Party Advisory
https://rustsec.org/advisories/RUSTSEC-2024-0338.htmlcve@mitre.org
Exploit
Third Party Advisory
Hyperlink: https://crates.io/crates/cosmwasm-std
Source: cve@mitre.org
Resource:
Product
Hyperlink: https://github.com/CosmWasm/advisories/blob/main/CWAs/CWA-2024-002.md
Source: cve@mitre.org
Resource:
Exploit
Patch
Third Party Advisory
Hyperlink: https://rustsec.org/advisories/RUSTSEC-2024-0338.html
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

5Records found

CVE-2024-10917
Matching Score-4
Assigner-Eclipse Foundation
ShareView Details
Matching Score-4
Assigner-Eclipse Foundation
CVSS Score-3.7||LOW
EPSS-0.09% / 25.83%
||
7 Day CHG~0.00%
Published-11 Nov, 2024 | 16:55
Updated-09 Jan, 2025 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Eclipse OpenJ9 might return an incorrect value in JNI function GetStringUTFLength

In Eclipse OpenJ9 versions up to 0.47, the JNI function GetStringUTFLength may return an incorrect value which has wrapped around. From 0.48 the value is correct but may be truncated to include a smaller number of characters.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-openj9Open J9
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-53156
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.5||MEDIUM
EPSS-0.03% / 6.84%
||
7 Day CHG~0.00%
Published-27 Jul, 2025 | 00:00
Updated-07 Aug, 2025 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The transpose crate before 0.2.3 for Rust allows an integer overflow via input_width and input_height arguments.

Action-Not Available
Vendor-ejmahlerejmahler
Product-transposetranspose
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-4945
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-3.7||LOW
EPSS-0.04% / 12.11%
||
7 Day CHG~0.00%
Published-19 May, 2025 | 17:03
Updated-30 Jul, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Libsoup: integer overflow in cookie expiration date handling in libsoup

A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in undefined behavior, allowing an attacker to bypass cookie expiration logic, causing persistent or unintended cookie behavior. The issue stems from improper validation of large integer inputs during date arithmetic operations within the cookie parsing routines.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 9Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8Red Hat Enterprise Linux 10Red Hat Enterprise Linux 7
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-50404
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 16.27%
||
7 Day CHG+0.01%
Published-01 Jul, 2025 | 00:00
Updated-20 Aug, 2025 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Intelbras RX1500 Router v2.2.17 and before is vulnerable to Integer Overflow. The websReadEvent function incorrectly uses the int type when processing the "command" field of the http header, causing the array to cross the boundary and overwrite other fields in the array.

Action-Not Available
Vendor-intelbrasn/a
Product-rx_1500_firmwarerx_1500n/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-7488
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 30.77%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 14:03
Updated-05 Dec, 2024 | 08:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Business Logic Error in RestApp Inc.'s Online Ordering System

Improper Input Validation vulnerability in RestApp Inc. Online Ordering System allows Integer Attacks.This issue affects Online Ordering System: 8.2.1.  NOTE: Vulnerability fixed in version 8.2.2 and does not exist before 8.2.1.

Action-Not Available
Vendor-RestApp Inc.restapp
Product-Online Ordering Systemonline_ordering_system
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-190
Integer Overflow or Wraparound
Details not found