bug-bounty405
google392
xss350
microsoft305
facebook274
apple184
exploit182
rce174
malware136
cve107
account-takeover94
csrf86
browser85
writeup69
privilege-escalation66
phishing61
dos60
react59
supply-chain56
bragging-post55
authentication-bypass54
cloudflare51
node51
ssrf49
aws48
docker48
access-control46
smart-contract45
reverse-engineering45
web344
ethereum43
defi42
pentest41
oauth41
sql-injection40
lfi35
idor35
race-condition33
info-disclosure33
smart-contract-vulnerability32
cloud31
buffer-overflow30
auth-bypass29
wordpress29
clickjacking29
solidity27
subdomain-takeover27
vulnerability-disclosure25
web-application24
sqli23
0
8/10
vulnerability
Verichains discovered a critical vulnerability in Polygon zkEVM's zkProver component stemming from field incompatibility between STARK (operating on F_p^3) and SNARK (operating on F_q) in the recursive proof conversion process. The flaw allowed attackers to forge arbitrary valid proofs, enabling unauthorized state manipulation and potential loss of funds across L2 and L1, which was patched in December 2023.
zero-knowledge-proofs
proof-forgery
zkvm
layer-2
polygon
stark-snark
recursive-proving
field-incompatibility
merkle-tree
arithmetic-gate
cryptographic-vulnerability
constraint-system
Polygon zkEVM
Verichains
Immunefi
eSTARK
STARK
SNARK
pil-stark
StarkVerifier Bn128
Ethereum