bug-bounty406
google396
xss352
microsoft308
facebook282
exploit187
apple185
rce176
malware141
cve110
account-takeover94
browser88
csrf86
writeup70
privilege-escalation66
phishing62
dos60
react60
supply-chain57
bragging-post55
authentication-bypass54
node51
cloudflare51
ssrf50
aws48
docker48
access-control46
smart-contract45
reverse-engineering45
web345
ethereum43
defi42
oauth41
pentest41
sql-injection40
lfi36
idor35
info-disclosure34
race-condition34
smart-contract-vulnerability32
cloud32
buffer-overflow31
auth-bypass30
clickjacking29
wordpress29
solidity27
subdomain-takeover27
vulnerability-disclosure25
ctf24
web-application24
0
8/10
vulnerability
A critical logic flaw in Movement Labs' full node software lacked height-based fork-choice logic, allowing two blocks at the same height with different IDs to be processed and permanently splitting the chain. The vulnerability required missing a height check in the process_block_from_da function, enabling double-spend attacks and necessitating a hard fork to resolve.
chain-split
blockchain-consensus
logic-flaw
data-availability
fork-choice
double-spend
movement-labs
web3-security
responsible-disclosure
hard-fork
network-partition
rust
Movement Labs
Yunus Emre Sarıtoprak
Immunefi
Celestia
execute_settle.rs
process_block_from_da