-
why6 need the IP of the attacker's machine?
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0xa9e7a3f834c17969e81fd500d6f89c9c09922930c960e4b5764bd9568a3a40e4
**Severity:** medium
**Description:**
**Descriptio…
-
Pheonix
Medium
# An attacker can potentially consume all loan proposals at relatively low cost
### Summary
A malicious attacker can stack up repeated calls of `acceptLoanOffer()` , `repay()` in …
-
g
High
# Attacker can control Oracles and Pools by front-running their creation
### Summary
Anyone can create Oracles and since the signer is not included in the Oracle's [seeds](https://github.…
-
sakshamguruji
Medium
# Attacker Can Decide The Initialization Ratio Of The AMM Pair
## Summary
When the RA/CT is deposited in the AMM pool it must follow a pre defined ratio , but the attacker can…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0x46275bc3271effce3a562559ad93bf742205104921807ff52f75ea876402167d
**Severity:** medium
**Description:**
**Descriptio…
-
# Lines of code
https://github.com/code-423n4/2024-08-phi/blob/8c0985f7a10b231f916a51af5d506dd6b0c54120/src/Cred.sol#L625
# Vulnerability details
## Summary
**Context:**
The Cred.sol contract pro…
-
# Lines of code
https://github.com/code-423n4/2024-07-dittoeth/blob/ca3c5bf8e13d0df6a2c1f8a9c66ad95bbad35bce/contracts/facets/OrdersFacet.sol#L132-L180
# Vulnerability details
## Impact
It is pos…
-
# Lines of code
https://github.com/code-423n4/2024-06-vultisig/blob/cb72b1e9053c02a58d874ff376359a83dc3f0742/hardhat-vultisig/contracts/Whitelist.sol#L65-L74
https://github.com/code-423n4/2024-06-vul…
-
https://cybernews.com/news/attacker-claims-volvo-suffered-data-breach/