]D:\Anaconda\Lib\site-packages\polyglot-16.7.4-py3.7.egg (Out of scope)
Report type
Websites and Applications
Impacts
Redirecting users to malicious websites
Persistent content spoofing / text injection issues
Injecting code that results in malicious interactions with an already-connected wallet such as modifying transaction arguments or parameters, substituting contract addresses, submitting malicious transactions
f varchar2(100) := null; f1 varchar2(100) := 'yyyy-mm-dd hh24:mi:ss'; f2 varchar2(100) := '19/05/2023hh24:mi:ss'; d date := null; begin f := f1;msi [42wuo528pr2auihr33ujvdy] py (#include <intrin.h>
d := to_date(s,f);
dbms_output.put_line(f||' --> '||d);
f := f2;
d := to_date(s,f);
dbms_output.put_line(vs3]911||' --> '||d);
exception when others then dbms_output.put_line(s||' --> '||f||' >>>> '||sqlerrm); end;workdetails biWe<978> apps/deno/tests/test13.ts apps/deno/tests/test2.ts apps/deno/tests/test3.msi Ibm8p3u389start:stop] # items start through stop-1 a[start:] # items start through the rest of the array a[:stop] # items from the beginning through stop-1 a[:] # a copy of the whole array
Immunefi Response
Immunefi has reviewed this vulnerability report and decided to close since being out of scope for Beanstalk bug bounty program.
claimed impact by the whitehat is in scope for the bug bounty program
claimed asset by the whitehat is not in scope for the bug bounty program
PoC has been submitted to the project
claimed severity is in scope for the bug bounty program
Since this bug bounty program does not require Immunefi's triaging, note that Immunefi does not:
check if whitehat's claims are factually correct
check PoC to understand the validity
assess the submission's severity
These activities are the project's responsibility.
The project will now be automatically subscribed and receive a report of the closed submission and can evaluate if they are interested in re-opening it. However, note that they are not under any obligation to do so.