bug-bounty497
google318
xss300
microsoft262
facebook230
rce194
exploit166
apple155
malware144
cve131
account-takeover113
bragging-post110
privilege-escalation88
csrf86
authentication-bypass71
stored-xss66
writeup62
phishing62
browser59
reflected-xss59
dos59
supply-chain57
access-control52
reverse-engineering50
input-validation49
web-security49
react49
cloudflare48
defi48
ssrf48
smart-contract47
cross-site-scripting46
open-source46
oauth44
ethereum44
sql-injection43
lfi43
aws41
web340
node39
docker38
web-application38
race-condition37
ctf37
api-security36
burp-suite36
ai-agents35
pentest35
info-disclosure35
buffer-overflow33
0
6/10
vulnerability
O3's cross-chain bridge aggregators allow arbitrary address impersonation via the callproxy parameter in exactInputSinglePToken(), enabling attackers to execute swaps using victim-approved funds and redirect outputs to attacker addresses. The vulnerability affects all aggregators across supported chains except when users set MAX_APPROVE.
defi
smart-contract
access-control
token-approval
cross-chain-bridge
uniswap
ethereum
arbitrary-swap
impersonation
bug-bounty
bragging-post
O3
O3EthereumUniswapV3Aggregator
0x561f712b4659be27efa68043541876a137da532b
0xC11073e2F3EC407a44b1Cff9D5962e6763F71187
Uniswap V3
USDT
USDC
0xDjango
Immunefi