bug-bounty407
google401
xss352
microsoft314
facebook284
exploit191
apple187
rce176
malware145
cve111
account-takeover96
browser89
csrf86
writeup71
privilege-escalation66
phishing63
dos60
react60
supply-chain57
bragging-post55
authentication-bypass54
node51
cloudflare51
ssrf50
docker48
aws48
access-control46
smart-contract45
reverse-engineering45
web345
ethereum43
oauth42
defi42
pentest41
sql-injection40
idor36
lfi36
info-disclosure35
race-condition34
cloud32
smart-contract-vulnerability32
buffer-overflow31
auth-bypass30
wordpress29
clickjacking29
subdomain-takeover27
solidity27
vulnerability-disclosure25
cors24
web-application24
0
8/10
vulnerability
Story Network discovered a critical denial-of-service vulnerability where arbitrarily large EVM transactions (>4MB) could be crafted to crash validators by exploiting loose unmarshalling of ExecutionPayload fields, inherited from Omni's Octane codebase. The attack leverages JSON marshalling to double block size, allowing an attacker to exceed the 4MB panic threshold and halt the entire network.
denial-of-service
network-shutdown
evm
consensus-client
block-size-limit
json-marshalling
payload-injection
validator-crash
blockchain
postmortem
Story Network
Cantina
Octane
Omni
Geth
CometBFT