proof-of-concept

5 articles
Sort: New Top Best
clear filter
0 8/10
vulnerability

A missing access control and unchecked state transition vulnerability in Alchemist's TimelockConfig.confirmChange() function allows any attacker to set arbitrary configuration parameters (including admin and recipient addresses) to zero without initiating the required first step, permanently bricking critical DeFi functions like token minting for staking rewards.

Alchemist Fjord Foundry Aludel Crucible TimelockConfig Dacian gogotheauditor pashovkrum
dacian.me · Dacian · 4 hours ago · details
0 9/10
vulnerability

A reentrancy vulnerability in TectonicStakingPoolV3 allows attackers to mint xTonic tokens for free by injecting a malicious token into swap paths during performConversionForTokens() calls, enabling theft of over $2.5M with minimal capital ($23K TONIC). The attack exploits unwhitelisted intermediate swap path tokens to gain execution control and stake during balance calculations.

TectonicStakingPoolV3 0xE165132FdA537FA89Ca1B52A647240c2B84c8F89 TONIC xTonic WCRO VVS AttackerStaker AttackerToken
gist.github.com · 0xDjango · 4 hours ago · details
0
bug-bounty

A security researcher earned $10,000 on Immunefi by discovering two related vulnerabilities in DFX Finance: unhandled fee-on-transfer (FoT) tokens that drain liquidity from USDC pairs, and risks from USDC being upgradable, which could introduce breaking changes to the protocol. The submission succeeded through a functional proof-of-concept, real-world impact examples, and actionable remediation recommendations.

DFX Finance Beirao Code4Arena Immunefi Trail of Bits USDC EURT GYEN PAXG USDT Uniswap SEC
beirao.xyz · Beirao · 4 hours ago · details
0

A security researcher discovered a CORS misconfiguration on a mobile app API that accepted arbitrary origins and included Access-Control-Allow-Credentials, allowing credential-based requests from attacker-controlled domains. Despite identifying the vulnerability, exploitation was limited due to high attack complexity (API only accessible in mobile app), though a proof-of-concept demonstrated the ability to exfiltrate sensitive account information when credentials were available in the browser.

Smaran Chand Bugcrowd Frida Burpsuite Firefox XMLHttpRequest
smaranchand.com.np · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0
vulnerability

MySQL clients can be abused via the LOAD DATA LOCAL INFILE feature to exfiltrate arbitrary files from the client machine by setting up a fake MySQL server that bypasses authentication and sends malicious payloads. This exploitation technique works because MySQL clients trust server-sent commands after authentication, allowing attackers to read sensitive files like /etc/hosts from compromised systems.

MySQL PHP 7.0.32 MySQL 8.0.13 MySQL 5.7.24
vesiluoma.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details