-
Notifications
You must be signed in to change notification settings - Fork 8
Issues: Egis-Security/CTF_Challenge
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
deth_ctf: Deployer won't be able to retrieve the actual address of the created vault
bug
Something isn't working
duplicate
This issue or pull request already exists
#47
opened Aug 15, 2024 by
Zinda-Lukman
nmirchev8_ctf Incorrect gas computation
invalid
This doesn't seem right
#46
opened Aug 14, 2024 by
Divyanshu-Madhav
nmirchev8_ctf - Incorrect check for gas
invalid
This doesn't seem right
#44
opened Aug 13, 2024 by
0xleadwizard
deth_ctf : The variable of
Vault:owner
should be declared as immutable
Informational
#43
opened Aug 13, 2024 by
hrmneffdii
deth_ctf Function deployVault An Attacker can prevent a user from never being able to deploy vault
bug
Something isn't working
duplicate
This issue or pull request already exists
#41
opened Aug 13, 2024 by
D4n13l-D33
b0g0_CTF withdraw function Smart Wallet Users and Contracts could potentially have their funds stuck in the contract.
duplicate
This issue or pull request already exists
#40
opened Aug 12, 2024 by
D4n13l-D33
b0g0_Ctf: This issue or pull request already exists
withdraw
Function DOS for conttracts Due to Low-Level Call with Whitespace
duplicate
#39
opened Aug 12, 2024 by
DevPelz
deth_ctf - Incorrect address computation
bug
Something isn't working
duplicate
This issue or pull request already exists
#38
opened Aug 12, 2024 by
Maroutis
b0g0_ctf - user (smart contract) can deposit ether and not get the
NFT
due to _mint function
Informational
#36
opened Aug 12, 2024 by
IkiliagwuC
b0g0_ctf - Unauthorized Withdrawal via NFT Transfer
duplicate
This issue or pull request already exists
#35
opened Aug 12, 2024 by
mo-hak
nmirchev8_ctf - Incorrect returnData parsing causes reverts for returns smaller than maxReturnDataBytes and calls that revert
bug
Something isn't working
duplicate
This issue or pull request already exists
partial
#34
opened Aug 12, 2024 by
highskore
b0g0_ctf - Lack of Zero Address Check in deposit Function
invalid
This doesn't seem right
#32
opened Aug 12, 2024 by
Chidubemkingsley
b0g0_ctf - .call() in function withdraw(uint256) with whitespace payload
duplicate
This issue or pull request already exists
#31
opened Aug 12, 2024 by
Viktor-Andreev4
b0g0_ctf - ETH cannot be withdrawn if user that minted is contract.
bug
Something isn't working
#30
opened Aug 12, 2024 by
v-kirilov
nmirchev8_ctf -Fixed Return Data Size Allocation
bug
Something isn't working
duplicate
This issue or pull request already exists
partial
#29
opened Aug 12, 2024 by
Chidubemkingsley
deth_ctf - codeHash check in Something isn't working
duplicate
This issue or pull request already exists
deployVault
does not correctly check for non-empty address, malicious user can self-destruct 1 wei to prevent an account from creating a vault forever.
bug
#28
opened Aug 12, 2024 by
IkiliagwuC
b0g0_ctf - deposit function always sets user deposit to the current deposit
bug
Something isn't working
#27
opened Aug 12, 2024 by
Viktor-Andreev4
deth_ctf - This doesn't seem right
Vault
cannot be locked again by its owner
invalid
#26
opened Aug 12, 2024 by
ghost
b0g0_ctf - Unlimited deposits lead to potential loss of funds
invalid
This doesn't seem right
#25
opened Aug 12, 2024 by
dimi6oni
nmirchev8_ctf - Incorrect Handling of returndatacopy ##4
duplicate
This issue or pull request already exists
#24
opened Aug 12, 2024 by
Chidubemkingsley
Previous Next
ProTip!
Exclude everything labeled
bug
with -label:bug.