bug-bounty498
google352
xss301
microsoft295
facebook262
rce211
exploit199
malware171
apple163
cve136
account-takeover115
bragging-post102
privilege-escalation95
csrf90
phishing86
browser75
writeup74
authentication-bypass69
supply-chain67
dos66
stored-xss65
reflected-xss57
ssrf56
reverse-engineering55
react52
access-control52
input-validation49
cross-site-scripting48
aws47
cloudflare47
docker46
web-security46
lfi46
sql-injection45
smart-contract45
web-application44
ethereum44
web343
ctf43
oauth43
node43
defi43
pentest40
race-condition39
open-source38
cloud37
idor37
info-disclosure36
burp-suite36
vulnerability-disclosure35
0
7/10
bug-bounty
A critical smart contract vulnerability in Notional V2 allowed double-counting of free collateral in bitmap portfolio processing, enabling attackers to drain protocol liquidity by borrowing against overstated collateral. The bug was triggered via sequential calls to enableBitmapForAccount() and depositUnderlyingToken() that caused free collateral calculations to run twice on the same asset.
smart-contract
collateral-calculation
logic-bug
double-accounting
defi
ethereum
notional-v2
free-collateral
bitmap-portfolio
fcash
bug-bounty-writeup
vulnerability-analysis
proof-of-concept
Notional V2
0x60511e57
Immunefi
DAI
USDC
Ethereum
cDAI
cUSDC
fCash