bug-bounty408
google401
xss352
microsoft316
facebook286
exploit192
apple187
rce176
malware148
cve111
account-takeover96
browser89
csrf86
writeup71
privilege-escalation66
phishing63
dos60
react60
supply-chain58
bragging-post55
authentication-bypass54
node51
cloudflare51
ssrf50
docker48
aws48
access-control46
reverse-engineering46
smart-contract45
web345
ethereum43
oauth42
defi42
pentest41
sql-injection40
idor36
lfi36
info-disclosure35
race-condition34
cloud32
smart-contract-vulnerability32
auth-bypass31
buffer-overflow31
wordpress30
clickjacking29
subdomain-takeover27
solidity27
vulnerability-disclosure25
cors24
web-application24
0
8/10
vulnerability
Story Network discovered a critical denial-of-service vulnerability where arbitrarily large EVM transactions (>4MB) could be crafted to crash validators by exploiting loose unmarshalling of ExecutionPayload fields, inherited from Omni's Octane codebase. The attack leverages JSON marshalling to double block size, allowing an attacker to exceed the 4MB panic threshold and halt the entire network.
denial-of-service
network-shutdown
evm
consensus-client
block-size-limit
json-marshalling
payload-injection
validator-crash
blockchain
postmortem
Story Network
Cantina
Octane
Omni
Geth
CometBFT