arbitrary-code-execution

4 articles
Sort: New Top Best
clear filter
0 2/10
bragging-post

Portfolio page showcasing multiple critical smart contract vulnerabilities disclosed across DeFi protocols, including UUPS proxy initialization flaws, access control bypasses, and token theft vectors. While listing numerous bug bounty successes (>$6.5m rescued), it provides minimal technical depth and primarily serves as credentials summary.

88mph Polygon KeeperDAO Rivermen NFT OpenZeppelin abwagmi AxonsToken pxMythics Alchemix Ondo Finance Code4rena Immunefi iosiro Hack South YesWeHack BSides Cape Town Damn Vulnerable DeFi yAcademy TrustX Curve Finance
ashiq.co.za · Ashiq Amien · 4 hours ago · details
0 2/10
bragging-post

A portfolio page showcasing multiple critical smart contract vulnerability disclosures across DeFi protocols (88mph, Polygon, KeeperDAO, Alchemix, Ondo Finance) and bug bounty wins totaling over $6.5M in rescued funds, with brief technical descriptions of UUPS proxy exploits, access control flaws, and token theft vulnerabilities.

88mph Polygon KeeperDAO Rivermen NFT OpenZeppelin abwagmi AxonsToken pxMythics Alchemix Ondo Finance Code4rena yAcademy Immunefi iosiro BSides Cape Town Underhanded Solidity Contest Curve Finance
ashiq.co.za · Ashiq Amien · 4 hours ago · details
0 7/10
vulnerability

Threshold Network's L2WormholeGateway contract contained a critical vulnerability allowing attackers to mint unlimited canonical L2 tBTC by exploiting the depositWormholeTbtc function through reentrancy via a malicious ERC20 token's transfer callback. The vulnerability was discovered via Immunefi bug bounty, patched by removing the vulnerable function and adding reentrancy protection, with no funds lost.

Threshold Network tBTC Immunefi Wormhole L2WormholeGateway Arbitrum Base Optimism Polygon Bitcoin
blog.threshold.network · unknown · 4 hours ago · details
0

This article explains how buffer overflow vulnerabilities work, demonstrating how attackers craft malicious input to overwrite stack memory, particularly return addresses, to execute arbitrary code. It covers the mechanics of stack buffer overflows, practical examples in C, and discusses modern OS-level and compiler-based prevention techniques like DEP, ASLR, and stack canaries.

Invicti Piotr Sobolewski StackGuard Linux Microsoft Windows macOS
netsparker.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details