bug-bounty498
google349
xss301
microsoft292
facebook262
rce211
exploit199
malware169
apple161
cve136
account-takeover115
bragging-post102
privilege-escalation95
csrf90
phishing86
browser75
writeup74
authentication-bypass69
supply-chain67
dos66
stored-xss65
reflected-xss57
ssrf56
reverse-engineering55
react52
access-control52
input-validation49
cross-site-scripting48
cloudflare47
aws47
web-security46
lfi46
docker46
sql-injection45
smart-contract45
ethereum44
web-application44
ctf43
oauth43
defi43
web343
node42
pentest39
open-source39
race-condition39
cloud37
idor37
info-disclosure36
burp-suite36
auth-bypass35
0
7/10
bug-bounty
A critical smart contract vulnerability in Notional V2 allowed double-counting of free collateral in bitmap portfolio processing, enabling attackers to drain protocol liquidity by borrowing against overstated collateral. The bug was triggered via sequential calls to enableBitmapForAccount() and depositUnderlyingToken() that caused free collateral calculations to run twice on the same asset.
smart-contract
collateral-calculation
logic-bug
double-accounting
defi
ethereum
notional-v2
free-collateral
bitmap-portfolio
fcash
bug-bounty-writeup
vulnerability-analysis
proof-of-concept
Notional V2
0x60511e57
Immunefi
DAI
USDC
Ethereum
cDAI
cUSDC
fCash