-
Hi,
we have detected that your project may be vulnerable to Insufficient Information in the function of `uECC_sign_with_k` in the file of ` targetlibs/nrf5x_12/external/micro-ecc/uECC.c`,`targetl…
-
# Lines of code
https://github.com/code-423n4/2024-06-vultisig/blob/main/src/ILOManager.sol#L124-L147
# Vulnerability details
## Impact
- An actual owner of the project will not be able to launch …
-
Security Notions for Fully Encrypted Protocols
Ellis Fenske, Aaron Johnson
https://censorbib.nymity.ch/#Fenske2023a
[PDF](https://github.com/user-attachments/files/16566156/foci-2023-0004.pdf)
T…
-
0x52
high
# Adversary can reenter takeOverDebt() during liquidation to steal vault funds
## Summary
Due to the lack of nonReentrant modifier on takeOverDebt() a liquidatable position can be both li…
-
@ryan-detect-dot-dev
-
Hello there,
I'm currently trying to reproduce the APT29 Scenario 1 in local and noticed that the dependencies on the attacker platform (192.168.0.4) aren't pinned.
This is quite troublesome as …
-
# Lines of code
https://github.com/code-423n4/2024-05-arbitrum-foundation/blob/6f861c85b281a29f04daacfe17a2099d7dad5f8f/src/rollup/RollupUserLogic.sol#L180
# Vulnerability details
## Impact
When t…
-
We need attacks for the medium access control layer researched and developed. As a reference here is a list of some possible attacks in this layer that we have researched thus far:
1. **Jamming Att…
-
### The problem you're addressing
For users that desire advanced anonymity, there should be no clearnet traffic while performing activities via Tor that require privacy.
This is because when the…
-
ReQrypt is a free tool for bypassing a local adversary. This includes:
ISP-level URL-filtering (a.k.a. censorship) systems;
ISP or government data-logging/snooping systems; and
ISP or local netwo…