vulnerability-class

2 articles
sort: new top best
clear filter
0 8/10
vulnerability-research

Trust Security disclosed a widespread DOS vulnerability affecting 100+ DeFi projects that misuse EIP-2612's permit() function in contract call compositions. When permit() is frontrun as part of a multi-step transaction, it causes the entire function to revert, enabling denial-of-service attacks—a flaw in the original EIP's threat model that assumes A;A* (reverted action) is harmless, but fails when A is part of a sequence A;B;C.

EIP-2612 ERC20 EIP-712 Immunefi OpenZeppelin AAVE The Graph Uniswap-V2 Ribbon Pods Nexus Mutual Mars Gro Ease Kyber DeBridge SpookySwap Angle Morpho 100proof Arbitrum
trust-security.xyz · Trust Security · 17 hours ago · details
0 6/10

Educational article explaining how buffer overflow vulnerabilities occur in low-level languages like C, how attackers exploit them via stack frame manipulation and return address overwriting, and what defense mechanisms (DEP, ASLR, stack canaries) are used to mitigate them.

Piotr Sobolewski Invicti Linux Microsoft Windows macOS StackGuard Java Python PHP JavaScript Perl
netsparker.com · devanshbatham/Awesome-Bugbounty-Writeups · 17 hours ago · details