algorithmic
-
A vulnerability was found in Litespeed Technologies LSQUIC up to 4.1.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Connection ID Handler. The manipulation leads to inefficient algorithmic complexity. This vulnerability is handled as CVE-2025-24947. The attack may be launched remotely. There is no exploit available.…
-
A vulnerability was found in privateoctopus picoquic. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Connection ID Handler. The manipulation leads to inefficient algorithmic complexity. This vulnerability is known as CVE-2025-24946. The attack can be launched remotely. There is no exploit available. It is recommended to…
-
A vulnerability, which was classified as problematic, has been found in ptrd Kwik up to 0.10.0. Affected by this issue is some unknown functionality of the component Connection ID Handler. The manipulation leads to inefficient algorithmic complexity. This vulnerability is handled as CVE-2025-23020. The attack may be launched remotely. There is no exploit available. It…
-
The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems powered by Deep Learning
·
arXiv:2505.10430v1 Announce Type: new Abstract: We study the security of stock price forecasting using Deep Learning (DL) in computational finance. Despite abundant prior research on the vulnerability of DL to adversarial perturbations, such work has hitherto hardly addressed practical adversarial threat models in the context of DL-powered algorithmic trading systems (ATS). Specifically, we investigate the…
-
arXiv:2505.05707v1 Announce Type: cross Abstract: The integration of AI into daily life has generated considerable attention and excitement, while also raising concerns about automating algorithmic harms and re-entrenching existing social inequities. While the responsible deployment of trustworthy AI systems is a worthy goal, there are many possible ways to realize it, from policy and regulation…
-
What is PLeak, and what are the risks associated with it? We explored this algorithmic technique and how it can be used to jailbreak LLMs, which could be leveraged by threat actors to manipulate systems and steal sensitive data.
-
A vulnerability was found in cmark-gfm 0.28.3.gfm.21/0.29.0.gfm.3/0.29.0.gfm.6/0.29.0.gfm.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file ~/cmark-gfm$ of the component CommonMark Parsing. The manipulation leads to inefficient algorithmic complexity. This vulnerability is known as CVE-2023-26485. The attack can be launched remotely. There is no exploit available. It…
-
A vulnerability, which was classified as problematic, has been found in GitHub cmark-gfm up to 0.29.0.gfm.6. This issue affects the function handle_close_bracket of the component CommonMark Parsing. The manipulation leads to inefficient algorithmic complexity. The identification of this vulnerability is CVE-2023-22486. The attack may be initiated remotely. There is no exploit available. It is recommended…
-
A vulnerability was found in Litespeed Technologies LSQUIC up to 4.1.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Connection ID Handler. The manipulation leads to inefficient algorithmic complexity. This vulnerability is handled as CVE-2025-24947. The attack may be launched remotely. There is no exploit available.…
-
A vulnerability was found in privateoctopus picoquic. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Connection ID Handler. The manipulation leads to inefficient algorithmic complexity. This vulnerability is known as CVE-2025-24946. The attack can be launched remotely. There is no exploit available. It is recommended to…
-
A vulnerability, which was classified as problematic, has been found in ptrd Kwik up to 0.10.0. Affected by this issue is some unknown functionality of the component Connection ID Handler. The manipulation leads to inefficient algorithmic complexity. This vulnerability is handled as CVE-2025-23020. The attack may be launched remotely. There is no exploit available. It…
-
A vulnerability has been found in GitLab Community Edition and Enterprise Edition up to 17.5.4/17.6.2/17.7.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to inefficient algorithmic complexity. This vulnerability is known as CVE-2024-6324. The attack can be launched remotely. There is no exploit available. It is recommended to…
-
Amnesty International, along with 14 other organizations, issued a complaint on Wednesday demanding the French Social Security Agency’s National Family Allowance Fund (CNAF) stop using a risk-scoring algorithmic system.
-
The American Privacy Rights Act will be introduced Tuesday in the House of Representatives, though recent cuts to the bill have drawn the criticism of privacy advocates.
-
As skiers schussed and swerved in a snow park outside Beijing during the 2022 Winter Olympics, a few may have noticed a string of towers along the way. Did they know that those towers were collecting wavelengths across the spectrum and scouring the data for signs of suspicious movement? Did they care that they were…
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
For years, many of the AI systems used for facial recognition and identity verification have had a race and gender bias problem. Systems have shown higher misidentification rates for people with darker skin, and have sometimes contributed to wrongful arrests. The main reason behind this is the data AI models have been trained on, which…