-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
CVE Vulnerability Details :
CVE-2022-48216
PUBLISHED
More Info
Official Page
Assigner
-
mitre
Assigner Org ID
-
8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At
-
04 Jan, 2023 | 00:00
Updated At
-
10 Apr, 2025 | 14:05
Rejected At
-
▼
CVE Numbering Authority (CNA)
Uniswap Universal Router before 1.1.0 mishandles reentrancy. This would have allowed theft of funds.
Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
n/a
Problem Types
Type
CWE ID
Description
text
N/A
n/a
Type:
text
CWE ID:
N/A
Description:
n/a
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://github.com/Uniswap/universal-router/commit/d82c6685ef566d9b280651c99f4b93a8454c08a8
N/A
https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae
N/A
https://github.com/Uniswap/universal-router/compare/v1.0.1...v1.1.0
N/A
https://twitter.com/dedaub/status/1610058814094450694
N/A
https://github.com/Uniswap/universal-router/pull/189
N/A
Hyperlink:
https://github.com/Uniswap/universal-router/commit/d82c6685ef566d9b280651c99f4b93a8454c08a8
Resource:
N/A
Hyperlink:
https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae
Resource:
N/A
Hyperlink:
https://github.com/Uniswap/universal-router/compare/v1.0.1...v1.1.0
Resource:
N/A
Hyperlink:
https://twitter.com/dedaub/status/1610058814094450694
Resource:
N/A
Hyperlink:
https://github.com/Uniswap/universal-router/pull/189
Resource:
N/A
▼
Authorized Data Publishers (ADP)
1.
CVE Program Container
Affected Products
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://github.com/Uniswap/universal-router/commit/d82c6685ef566d9b280651c99f4b93a8454c08a8
x_transferred
https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae
x_transferred
https://github.com/Uniswap/universal-router/compare/v1.0.1...v1.1.0
x_transferred
https://twitter.com/dedaub/status/1610058814094450694
x_transferred
https://github.com/Uniswap/universal-router/pull/189
x_transferred
Hyperlink:
https://github.com/Uniswap/universal-router/commit/d82c6685ef566d9b280651c99f4b93a8454c08a8
Resource:
x_transferred
Hyperlink:
https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae
Resource:
x_transferred
Hyperlink:
https://github.com/Uniswap/universal-router/compare/v1.0.1...v1.1.0
Resource:
x_transferred
Hyperlink:
https://twitter.com/dedaub/status/1610058814094450694
Resource:
x_transferred
Hyperlink:
https://github.com/Uniswap/universal-router/pull/189
Resource:
x_transferred
2.
CISA ADP Vulnrichment
Affected Products
Problem Types
Type
CWE ID
Description
CWE
CWE-667
CWE-667 Improper Locking
Type:
CWE
CWE ID:
CWE-667
Description:
CWE-667 Improper Locking
Metrics
Version
Base score
Base severity
Vector
3.1
7.5
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Version:
3.1
Base score:
7.5
Base severity:
HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
Details not found