bug-bounty497
google347
xss301
microsoft290
facebook261
rce211
exploit198
malware168
apple161
cve135
account-takeover115
bragging-post102
privilege-escalation96
csrf90
phishing86
browser75
writeup74
authentication-bypass69
supply-chain67
dos66
stored-xss65
reflected-xss57
ssrf56
reverse-engineering54
access-control52
react52
input-validation49
cross-site-scripting48
cloudflare47
aws47
docker46
web-security46
lfi46
smart-contract45
sql-injection45
web-application44
ethereum44
ctf43
web343
defi43
oauth43
node41
race-condition39
pentest39
open-source39
idor37
cloud37
info-disclosure36
burp-suite36
auth-bypass35
0
7/10
bug-bounty
A critical smart contract vulnerability in Notional V2 allowed double-counting of free collateral in bitmap portfolio processing, enabling attackers to drain protocol liquidity by borrowing against overstated collateral. The bug was triggered via sequential calls to enableBitmapForAccount() and depositUnderlyingToken() that caused free collateral calculations to run twice on the same asset.
smart-contract
collateral-calculation
logic-bug
double-accounting
defi
ethereum
notional-v2
free-collateral
bitmap-portfolio
fcash
bug-bounty-writeup
vulnerability-analysis
proof-of-concept
Notional V2
0x60511e57
Immunefi
DAI
USDC
Ethereum
cDAI
cUSDC
fCash