bug-bounty480
google298
xss277
microsoft249
facebook211
rce159
apple150
exploit136
bragging-post102
account-takeover98
malware94
csrf84
cve79
privilege-escalation74
stored-xss65
authentication-bypass65
writeup61
reflected-xss57
browser54
react53
ssrf51
phishing50
cloudflare50
dos50
access-control49
input-validation49
cross-site-scripting48
node47
aws46
smart-contract45
docker45
sql-injection45
ethereum44
defi43
web-security43
web-application42
supply-chain42
oauth41
web339
burp-suite36
vulnerability-disclosure34
lfi34
idor34
html-injection33
smart-contract-vulnerability32
race-condition32
reverse-engineering31
clickjacking31
csp-bypass30
information-disclosure30
0
7/10
vulnerability
zkSync Lite suffered a critical vulnerability in its packed floating-point format implementation where unconstrained witness allocation in the parse_with_exponent_le function allowed attackers to generate valid proofs with arbitrary mantissa values, enabling unauthorized token minting, freezing, and transaction tampering. The vulnerability was patched by enforcing constraints on mantissa calculations using an into_allocated_num method.
zk-rollup
zero-knowledge-proof
floating-point-arithmetic
proof-verification
circuit-vulnerability
token-minting
transaction-tampering
constraint-validation
ethereum-l2
bug-bounty
responsible-disclosure
zkSync Lite
zkSync Era
LonelySloth
Immunefi
franklin-crypto
ZK Rollup
CVE-2023-XXXXX