bug-bounty405
google392
xss350
microsoft305
facebook274
apple184
exploit182
rce174
malware136
cve107
account-takeover94
csrf86
browser85
writeup69
privilege-escalation66
phishing61
dos60
react59
supply-chain56
bragging-post55
authentication-bypass54
cloudflare51
node51
ssrf49
aws48
docker48
access-control46
smart-contract45
reverse-engineering45
web344
ethereum43
defi42
pentest41
oauth41
sql-injection40
lfi35
idor35
race-condition33
info-disclosure33
smart-contract-vulnerability32
cloud31
buffer-overflow30
auth-bypass29
wordpress29
clickjacking29
solidity27
subdomain-takeover27
vulnerability-disclosure25
web-application24
sqli23
0
8/10
vulnerability
A critical vulnerability in Tranchess's ShareStaking contract allowed attackers to drain user funds by exploiting a skipped _checkpoint() call during rebalance events, causing total supply desynchronization. The attack enables direct theft of up to 815 BTC and 1438 ETH depending on attacker's fund size, with exploitation possible via frontrunning the rebalance settlement.
smart-contract
solidity
vulnerability-disclosure
reentrancy-adjacent
state-synchronization
checkpoint-mechanism
yield-farming
bsc
gas-optimization
accounting-bug
fund-drainage
frontrunning
Tranchess
ShareStaking
FundV3
Immunefi
Queen
Bishop
Rook
BSC