bug-bounty407
google401
xss352
microsoft314
facebook284
exploit191
apple187
rce176
malware145
cve111
account-takeover96
browser89
csrf86
writeup71
privilege-escalation66
phishing63
dos60
react60
supply-chain57
bragging-post55
authentication-bypass54
node51
cloudflare51
ssrf50
docker48
aws48
access-control46
smart-contract45
reverse-engineering45
web345
ethereum43
oauth42
defi42
pentest41
sql-injection40
idor36
lfi36
info-disclosure35
race-condition34
cloud32
smart-contract-vulnerability32
buffer-overflow31
auth-bypass30
wordpress29
clickjacking29
subdomain-takeover27
solidity27
vulnerability-disclosure25
cors24
web-application24
0
8/10
vulnerability
Tokemak's liquidity controllers are vulnerable to token theft via pool ratio manipulation. An attacker with ADD_LIQUIDITY_ROLE can plant a malicious Uniswap/Sushi pair with an extreme token ratio, then trigger the deploy() function to cause the controller to deposit funds at that manipulated ratio, losing up to 100% of reserves through subsequent swaps exploiting the constant product formula.
privilege-escalation
liquidity-pool-manipulation
price-oracle-manipulation
flash-loan-like-attack
uniswap
sushiswap
constant-product-formula
token-theft
smart-contract-vulnerability
defi
access-control-bypass
twap-oracle-missing
Tokemak
SushiswapControllerV2
UniswapController
FOX
ALCX
Chainlink