Vulnerabilities
Vulnerable Software
Cloakcoin:  Security Vulnerabilities
CloakCoin through 2.2.2.0 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk.
CVSS Score
7.5
EPSS Score
0.008
Published
2019-11-05


Contact Us

Shodan ® - All rights reserved