The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/consensys/gnark
to version 0.9.0 or higher.
github.com/consensys/gnark is a gnark is a fast zk-SNARK library that offers a high-level API to design circuits.
Affected versions of this package are vulnerable to Integer Underflow (Wrap or Wraparound) via the frontend.API.Cmp
and frontend.API.IsLess
methods in the variable comparison and binary decomposition process. An attacker can manipulate the unsoundness of the system by exploiting the non-unique binary decomposition. This can lead to unexpected behaviour and potential security risks.
It is recommended to use std/math/cmp
gadget, which allows to bound the number of bits being compared, making the comparisons more efficient if the bound on the absolute difference of the values is known.