bug-bounty408
google401
xss352
microsoft316
facebook286
exploit192
apple187
rce176
malware148
cve111
account-takeover96
browser89
csrf86
writeup71
privilege-escalation66
phishing63
dos60
react60
supply-chain58
bragging-post55
authentication-bypass54
node51
cloudflare51
ssrf50
docker48
aws48
access-control46
reverse-engineering46
smart-contract45
web345
ethereum43
oauth42
defi42
pentest41
sql-injection40
idor36
lfi36
info-disclosure35
race-condition34
cloud32
smart-contract-vulnerability32
auth-bypass31
buffer-overflow31
wordpress30
clickjacking29
subdomain-takeover27
solidity27
vulnerability-disclosure25
cors24
web-application24
0
8/10
vulnerability
Verichains discovered a critical vulnerability in Polygon zkEVM's zkProver component stemming from field incompatibility between STARK (operating on F_p^3) and SNARK (operating on F_q) in the recursive proof conversion process. The flaw allowed attackers to forge arbitrary valid proofs, enabling unauthorized state manipulation and potential loss of funds across L2 and L1, which was patched in December 2023.
zero-knowledge-proofs
proof-forgery
zkvm
layer-2
polygon
stark-snark
recursive-proving
field-incompatibility
merkle-tree
arithmetic-gate
cryptographic-vulnerability
constraint-system
Polygon zkEVM
Verichains
Immunefi
eSTARK
STARK
SNARK
pil-stark
StarkVerifier Bn128
Ethereum