bug-bounty433
google352
xss348
microsoft280
facebook245
apple171
exploit160
rce156
malware97
account-takeover94
cve88
csrf82
writeup80
bragging-post78
browser77
privilege-escalation67
react59
authentication-bypass57
cloudflare54
dos53
docker51
ssrf51
node50
aws47
access-control47
phishing46
smart-contract45
oauth45
ethereum43
supply-chain43
web342
defi42
sql-injection41
lfi37
idor34
smart-contract-vulnerability32
clickjacking31
race-condition31
web-application31
reverse-engineering31
info-disclosure30
wordpress30
vulnerability-disclosure29
cloud28
information-disclosure28
burp-suite28
solidity27
web-security27
cors26
ctf26
0
7/10
vulnerability
Beanstalk's convertFacet function failed to validate the Well address parameter, allowing attackers to supply a malicious contract that could return arbitrary BEAN amounts and set conversion costs to zero, enabling theft of protocol funds without proper token withdrawal. The fix added validation to ensure the Well address is whitelisted and that the fromAmount is always non-zero.
insufficient-input-validation
smart-contract
solidity
ethereum
defi
stablecoin
access-control
arbitrary-contract-call
deposit-withdrawal
bugfix-review
Beanstalk
Immunefi
BEAN
convertFacet
Silo
Well