80 articles tagged with #vulnerability. AI-curated summaries with sentiment analysis and key takeaways from 50+ sources.
CryptoBearishEthereum Foundation Blog · May 177/101
⛓️A critical security vulnerability has been discovered in Geth and potentially other Ethereum clients that allows remote attackers to perform DoS attacks and stall the synchronization process. While the likelihood of exploitation is very low, the severity is high, prompting immediate updates for all Go client versions.
CryptoBearishEthereum Foundation Blog · Oct 227/102
⛓️A security vulnerability in BLOCKHASH implementation affected Ethereum clients geth (versions up to 1.1.3 and 1.2.2) and eth (versions prior to 1.0.0), potentially causing consensus issues and chain reorganization. The bug has been fixed and users are advised to update their clients immediately.
$ETH
CryptoBearishEthereum Foundation Blog · Sep 107/101
⛓️A critical security vulnerability has been discovered in Go Ethereum clients that could lead to invalid state roots when processing specific transaction sequences. The bug affects unpatched versions including v1.1.2, v1.0.4, and master branches before September 9, though the likelihood of exploitation is considered low.
$ETH
CryptoBearishEthereum Foundation Blog · Aug 297/101
⛓️A security advisory warns that improperly configured Ethereum clients (particularly Geth) with exposed JSON-RPC ports, no firewall protection, and unlocked accounts can allow remote attackers to access funds. The vulnerability affects all Ethereum client implementations when configured insecurely, not just Geth.
$ETH
CryptoBearishEthereum Foundation Blog · Aug 77/102
⛓️A security vulnerability affects Windows users of the Alethzero GUI client, involving improper privacy permissions on the keys directory. Users of eth CLI client may also be at risk, while Frontier geth users are unaffected.
$ETH
CryptoBearishEthereum Foundation Blog · Jan 287/103
⛓️Andrew Miller has identified a new attack vector called the 'P + epsilon Attack' that targets SchellingCoin, a cryptocurrency oracle mechanism. This attack represents a significant vulnerability in cryptoeconomic systems that could impact how decentralized prediction markets and oracle systems function.
DeFiBearishCoinTelegraph · 4d ago6/10
💎Aethir successfully halted a bridge exploit affecting its Ethereum-linked contracts, containing losses to under $90,000 despite initial security firm estimates of $400,000 in potential damages. The project has committed to compensating affected users, highlighting the ongoing security risks in cross-chain bridge infrastructure.
$ETH
AIBearisharXiv – CS AI · Mar 176/10
🧠Researchers propose a priority graph model to understand conflicts in LLM alignment, revealing that unified stable alignment is challenging due to context-dependent inconsistencies. The study identifies 'priority hacking' as a vulnerability where adversaries can manipulate safety alignments, and suggests runtime verification mechanisms as a potential solution.
AIBearisharXiv – CS AI · Mar 176/10
🧠Researchers discovered that skip connections in deep neural networks make adversarial attacks more transferable across different AI models. They developed the Skip Gradient Method (SGM) which exploits this vulnerability in ResNets, Vision Transformers, and even Large Language Models to create more effective adversarial examples.
AIBearisharXiv – CS AI · Mar 166/10
🧠Researchers have identified 'role confusion' as the fundamental mechanism behind prompt injection attacks on language models, where models assign authority based on how text is written rather than its source. The study achieved 60-61% attack success rates across multiple models and found that internal role confusion strongly predicts attack success before generation begins.
AIBearisharXiv – CS AI · Mar 126/10
🧠A research study analyzing 319 LLM-generated security patches found that only 24.8% achieve full correctness, with most failures due to semantic misunderstanding rather than syntax errors. LLMs preserve functionality well but struggle significantly with security fixes, with success rates varying dramatically by vulnerability type.
AIBearisharXiv – CS AI · Mar 37/109
🧠Researchers have discovered MM-MEPA, a new attack method that can poison multimodal AI systems by manipulating only metadata while leaving visual content unchanged. The attack achieves up to 91% success rate in disrupting AI retrieval systems and proves resistant to current defense strategies.
AIBearisharXiv – CS AI · Mar 37/108
🧠Researchers have developed MIDAS, a new jailbreaking framework that successfully bypasses safety mechanisms in Multimodal Large Language Models by dispersing harmful content across multiple images. The technique achieved an 81.46% average attack success rate against four closed-source MLLMs by extending reasoning chains and reducing security attention.
$LINK
AIBearisharXiv – CS AI · Mar 37/108
🧠Researchers have discovered VidDoS, a new universal attack framework that can severely degrade Video-based Large Language Models by causing extreme computational resource exhaustion. The attack increases token generation by over 205x and inference latency by more than 15x, creating critical safety risks in real-world applications like autonomous driving.
CryptoNeutralCryptoSlate · Mar 16/105
⛓️Bitcoin developer Martin Habovštiak embedded a 66KB image in a single transaction without using OP_RETURN or Taproot, bypassing popular spam filters while following consensus rules. This demonstration exposed a governance vulnerability showing that closing one data pathway doesn't eliminate the capability but merely redirects it elsewhere.
$BTC
CryptoNeutralCryptoSlate · Feb 287/107
⛓️A critical security vulnerability was discovered in XRP Ledger's proposed 'Batch' amendment that could have allowed unauthorized account draining without user signatures. The XRPL Foundation caught the flaw before it reached the main network, preventing potential exploitation of user funds.
$XRP
DeFiBullishEthereum Foundation Blog · Sep 156/103
💎Fusaka announces a $2,000,000 audit contest co-sponsored by Gnosis and Lido, hosted on Sherlock platform. The four-week contest starting September 15th aims to identify vulnerabilities in the Fusaka upgrade before network deployment.
AINeutralOpenAI News · Jul 176/106
🧠OpenAI has launched a Bio Bug Bounty program inviting researchers to test ChatGPT agent's safety mechanisms using universal jailbreak prompts. The program offers rewards up to $25,000 for identifying vulnerabilities in the AI system's safety protocols.
CryptoBullishEthereum Foundation Blog · Nov 256/102
⛓️The Ethereum Foundation has launched its first protocol Attackathon with a $1.5 million reward pool, running from November 25th to January 20th and hosted by Immunefi. The initiative aims to enhance Ethereum protocol security by incentivizing researchers to identify vulnerabilities.
$ETH
CryptoNeutralEthereum Foundation Blog · May 36/102
⛓️The Ethereum Foundation has disclosed a second set of vulnerabilities through its Bug Bounty Program, following their coordinated disclosure process. These security issues were previously discovered and reported to the Foundation, which then coordinates with affected teams to address the vulnerabilities across the ecosystem.
$ETH
AIBullishOpenAI News · Apr 116/106
🧠OpenAI has launched a bug bounty program to enhance the security and reliability of their AI systems. The initiative seeks external help from security researchers to identify vulnerabilities as part of their commitment to developing safe and advanced AI technology.
CryptoNeutralEthereum Foundation Blog · Mar 96/101
⛓️The Ethereum Foundation disclosed the first set of vulnerabilities from its Bug Bounty Programs for both Execution and Consensus layers. These security issues were previously discovered and reported through the foundation's official bounty programs, representing a transparent approach to vulnerability management.
$ETH
CryptoBullishEthereum Foundation Blog · Sep 96/103
⛓️A bug bounty program was launched to identify vulnerabilities in the beacon chain specification and client implementations including Lighthouse, Nimbus, Teku, and Prysm. The program has yielded enlightening vulnerability reports and valuable lessons from patching potential security issues.
CryptoNeutralEthereum Foundation Blog · Nov 96/103
⛓️A storage corruption bug discovered last week was found to be much less severe than initially believed. The small number of affected contracts are either only exploitable by owners or can only cause service disruptions rather than financial losses.
CryptoBearishEthereum Foundation Blog · Sep 226/101
⛓️A transaction spam attack targeted the network using EXTCODESIZE opcode calls, causing blocks to take 20-60 seconds to validate due to excessive disk fetches. This resulted in a 2-3x reduction in network performance as validators struggled to process the malicious transactions.