bug-bounty487
google307
xss300
microsoft254
facebook222
rce192
exploit161
apple147
malware140
cve129
account-takeover113
bragging-post110
privilege-escalation88
csrf86
authentication-bypass71
stored-xss66
phishing61
writeup59
reflected-xss59
dos58
browser57
supply-chain55
access-control52
input-validation49
web-security49
react48
reverse-engineering48
defi48
ssrf48
smart-contract47
cross-site-scripting46
open-source46
cloudflare46
ethereum44
oauth44
sql-injection43
lfi42
aws41
web340
web-application38
docker38
ctf37
race-condition37
api-security36
burp-suite36
node35
ai-agents35
pentest34
smart-contract-vulnerability33
information-disclosure33
0
6/10
vulnerability
Iron Bank's seizeInternal() function in its lending protocol fails to properly account for seized collateral tokens when a buffer exists, leading to under-counted collateral for liquidators and potential unexpected liquidations. The bug occurs when the delta between actual seizable tokens and accounted tokens is not credited to the liquidator's collateral balance.
smart-contract
collateral-calculation
liquidation
accounting-bug
ethereum
compound-fork
access-control
financial-protocol
Iron Bank
0x7e8844ea4c211a69ad9308ba0b6cdb3ea0bb2b05
CCollateralCapERC20.sol
Etherscan