1. Home
  2. About the Project
  3. Vulnerability Patterns
  4. 1. Overview
  5. 2. Access Control
    1. 2.1. Critical
    2. 2.2. High
    3. 2.3. Medium
    4. 2.4. Low
  6. 3. Business Logic
    1. 3.1. Critical
    2. 3.2. High
    3. 3.3. Medium
    4. 3.4. Low
  7. 4. Calculation Errors
    1. 4.1. Critical
    2. 4.2. High
    3. 4.3. Medium
    4. 4.4. Low
  8. 5. Centralization Risk
    1. 5.1. High
    2. 5.2. Medium
    3. 5.3. Low
  9. 6. Cross-implementation
    1. 6.1. Medium
    2. 6.2. Low
  10. 7. Code Optimization
    1. 7.1. Low
  11. 8. Coding Mistake
    1. 8.1. Low
  12. 9. Collision
    1. 9.1. Medium
    2. 9.2. Low
  13. 10. Constant Definition
    1. 10.1. Critical
    2. 10.2. High
    3. 10.3. Medium
    4. 10.4. Low
  14. 11. Data Inconsistency
    1. 11.1. Critical
    2. 11.2. High
    3. 11.3. Medium
    4. 11.4. Low
  15. 12. Denial of Service
    1. 12.1. Critical
    2. 12.2. High
    3. 12.3. Medium
    4. 12.4. Low
  16. 13. Documentation Mismatch
    1. 13.1. Low
  17. 14. Front Running
    1. 14.1. High
    2. 14.2. Medium
    3. 14.3. Low
  18. 15. Gas-related Issues
    1. 15.1. Medium
    2. 15.2. Low
  19. 16. Inflation Attacks
    1. 16.1. Medium
    2. 16.2. Low
  20. 17. Input Validation
    1. 17.1. Critical
    2. 17.2. High
    3. 17.3. Medium
    4. 17.4. Low
  21. 18. Looping Issues
    1. 18.1. High
    2. 18.2. Medium
    3. 18.3. Low
  22. 19. Missing Functions
    1. 19.1. Critical
    2. 19.2. High
    3. 19.3. Medium
    4. 19.4. Low
  23. 20. Missing Version Check
    1. 20.1. High
    2. 20.2. Low
  24. 21. Oracle Issues
    1. 21.1. Critical
    2. 21.2. High
    3. 21.3. Medium
    4. 21.4. Low
  25. 22. Signature Replay
    1. 22.1. Low
  26. 23. Third-Party Risk
    1. 23.1. Low
  27. 24. Race Condition
    1. 24.1. Low
  28. 25. Runtime/Development
    1. 25.1. Medium
    2. 25.2. Low
  29. 26. State Management
    1. 26.1. Critical
    2. 26.2. High
    3. 26.3. Medium
    4. 26.4. Low
  30. Appendix
  31. 27. Appendix
  32. Learning Resources
  33. 28. Learning Resources

Move Vulnerability Database

Low