bug-bounty451
google354
xss338
microsoft283
facebook246
apple171
exploit163
rce160
malware102
account-takeover95
cve91
bragging-post86
csrf83
browser77
writeup75
privilege-escalation68
react60
authentication-bypass57
cloudflare54
dos53
node52
docker51
ssrf51
phishing50
aws48
access-control47
oauth45
smart-contract45
supply-chain44
ethereum43
defi42
web342
sql-injection41
lfi37
idor35
vulnerability-disclosure32
smart-contract-vulnerability32
clickjacking31
burp-suite31
info-disclosure31
race-condition31
web-application31
reverse-engineering31
wordpress30
input-validation30
web-security29
information-disclosure29
cloud29
reflected-xss29
solidity27
0
7/10
vulnerability
ChainLight researchers discovered a critical soundness bug in zkSync Era's ZK-circuit that allowed malicious provers to generate fake proofs for invalidly executed blocks. The bug was responsibly disclosed to Matter Labs, which deployed a fix and awarded a 50K USDC bounty.
zk-evm
soundness-bug
zk-circuits
zksync-era
validity-proof
zero-knowledge
layer-2
cryptography
bug-disclosure
proof-verification
zkSync Era
ChainLight
Matter Labs
EraVM
zk_evm
sync_vm
L2EthToken
MsgValueSimulator
Code4rena
0
7/10
vulnerability
zkSync Lite suffered a critical vulnerability in its packed floating-point format implementation where unconstrained witness allocation in the parse_with_exponent_le function allowed attackers to generate valid proofs with arbitrary mantissa values, enabling unauthorized token minting, freezing, and transaction tampering. The vulnerability was patched by enforcing constraints on mantissa calculations using an into_allocated_num method.
zk-rollup
zero-knowledge-proof
floating-point-arithmetic
proof-verification
circuit-vulnerability
token-minting
transaction-tampering
constraint-validation
ethereum-l2
bug-bounty
responsible-disclosure
zkSync Lite
zkSync Era
LonelySloth
Immunefi
franklin-crypto
ZK Rollup
CVE-2023-XXXXX