-
The Argo maintainers recently agreed to require all Argoproj Labs project repositories to contain a `SECURITY.md` file which documents:
* Contact information for reporting security vulnerabilities
*…
-
# Handle
WatchPug
# Vulnerability details
It isn’t safe to simply add a state variable when upgrading contracts because it "shifts down" all of the state variables below in the inheritance chain. …
-
# Handle
0xRajeev
# Vulnerability details
## Impact
The isValidDelegateorAdmin() is used for access control on both setLiquidityCap() and claim() but the @dev Natspec comment only specifies setLi…
-
```
What steps will reproduce the problem?
1. Use the Gitblit Go distribution with the bundled Jetty Server
See
http://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-
of-sh…
-
# Handle
0xsomeone
# Vulnerability details
## Impact
It is possible for a user to mislead a Pool Delegate to a seemingly innocuous loan by utilizing a token with more than 18 decimals as collater…
-
# Handle
0xRajeev
# Vulnerability details
## Impact
Input validation on address parameters checking for zero addresses is always recommended. This becomes especially critical for parameters which…
-
# Handle
0xRajeev
# Vulnerability details
## Impact
Input validation on address parameters checking for zero addresses is always recommended. This becomes especially critical for parameters which…
-
# Handle
0xRajeev
# Vulnerability details
## Impact
Input validation on address parameters checking for zero addresses is always recommended. This becomes especially critical for parameters which…
-
I found vulnerability in the implementation of the scheme that allows an attacker to directly recover some content of share C with only shares A and B in a 3 of 5 threshold scheme. It works in most…
-
Vulnerable Library - spring-boot-starter-thymeleaf-2.7.0-SNAPSHOT.jar
Path to vulnerable library: /java/url-redirection/pom.xml,/java/cors/pom.xml,/java/auth-bypass3/pom.xml,/java/sqli/pom.xml,/jav…