Table 1 Various smart contact vulnerabilities.

From: Enhancing smart contract security using a code representation and GAN based methodology

Level

Vulnerability

Root

Example of attack

Code

Integer Overflow

Improper Validation

BEC Token Attack: Exploits arithmetic

overflow in smart contracts

Reentrancy

External Call Vulnerability

DAO Attack

Delegatecall Attack

Misuse of delegatecall

Attack on the Parity Multi-Sig Wallet

Denial-of-Service (DoS)

Improper Validation

Ether King

EVM

Transferring Ether Losses

Missing Address Validation

You can send funds to an unreadable address

tx.origin Attack

Misuse of tx.origin

THORChain Hack

Short Address Attack

Missing Input Length Check

ERC20 Attack

Blockchain

Reliability on Time Stamps

Manipulable Block Timestamp

Allows miners to control timed operations

Dependency on Transaction Order

Miner-Controlled Transaction Order

This allows for both transaction management

and front-running

Information Dependency Block

Predictable Randomness

Unfair use of weak randomness is possible