“…In this section, we have reviewed Ethereum Smart Contract vulnerabilities [9], [31]- [45], [122], [123], [131], [132], [138]- [142] with some well-known attacks/example [32], [46]- [49], detection tools [30], [37], [50]- [58], [125], [133]- [137], [143], and their suggested preventive methods [30], [47], [59]- [63], [124], [126]. Researchers classified these vulnerabilities based on different criteria such as seriousness, root cause, flaws in solidity, security flaws, privacy flaws, performance flaws, flaws in EVM [27] byte code, and blockchain [64] characteristics.…”