bug-bounty408
google401
xss352
microsoft316
facebook286
exploit192
apple187
rce176
malware148
cve111
account-takeover96
browser89
csrf86
writeup71
privilege-escalation66
phishing63
dos60
react60
supply-chain58
bragging-post55
authentication-bypass54
node51
cloudflare51
ssrf50
docker48
aws48
access-control46
reverse-engineering46
smart-contract45
web345
ethereum43
oauth42
defi42
pentest41
sql-injection40
idor36
lfi36
info-disclosure35
race-condition34
cloud32
smart-contract-vulnerability32
auth-bypass31
buffer-overflow31
wordpress30
clickjacking29
subdomain-takeover27
solidity27
vulnerability-disclosure25
cors24
web-application24
0
8/10
vulnerability
A critical vulnerability in Tranchess's ShareStaking contract allowed attackers to drain user funds by exploiting a skipped _checkpoint() call during rebalance events, causing total supply desynchronization. The attack enables direct theft of up to 815 BTC and 1438 ETH depending on attacker's fund size, with exploitation possible via frontrunning the rebalance settlement.
smart-contract
solidity
vulnerability-disclosure
reentrancy-adjacent
state-synchronization
checkpoint-mechanism
yield-farming
bsc
gas-optimization
accounting-bug
fund-drainage
frontrunning
Tranchess
ShareStaking
FundV3
Immunefi
Queen
Bishop
Rook
BSC