“ most ” of the reported bugs and is “ working hard ” on the remainder . It expects the mainnet launch to stay on schedule . Qihoo 360 , a China-based internet security firm , says it has notifiedVulnerability-related.DiscoverVulnerabilitythe EOS blockchain project about “ a series of epic vulnerabilities ” discoveredVulnerability-related.DiscoverVulnerabilityon its platform . The firm said in a Tuesday reportVulnerability-related.DiscoverVulnerabilitythat loopholes foundVulnerability-related.DiscoverVulnerabilityin the EOS platform could expose nodes on the network to attackers , giving them the ability to execute code remotely and take “ full control ” of transactions . The firm claims that such an attack could potentially “ decimate ” the entire cryptocurrency network . Qihoo 360 went on to explain that bad actors would be able to attack the network by constructing and publishing smart contracts containing malicious code on the EOS mainnet and have EOS supernodes pack them into new blocks . Subsequently the code would affect all nodes on the network , including those of cryptocurrency wallets and exchanges , letting the attackers gain control of private keys to cryptocurrency transactions . While EOS has not yet made any public comment on the issue , Qihoo 360 said in another blog update that the project ’ s lead developer , Daniel Larimer , was notifiedVulnerability-related.DiscoverVulnerabilityof the issues and that he has since saidVulnerability-related.DiscoverVulnerabilitythe vulnerabilities – identified as issue number 3498 on Github – have been fixedVulnerability-related.PatchVulnerability. “ If any of these asserts trigger in release it shouldn ’ t pass , but should throw . Allowing the code to continue running in release is a potential security vulnerability and will likely result in crashes elsewhere , ” Larimer wrote on the Github page . Meanwhile , Larimer has today appealed for more external assistance in identifyingVulnerability-related.DiscoverVulnerabilitycritical bugs in the system with the project ’ s mainnet launch just days away .
ENTERPRISE-FOCUSED communication platform Fuze has fixedVulnerability-related.PatchVulnerabilitya security vulnerability that allowed anyone to access and download recorded meetings on the platform without password authentication . The flaw was discoveredVulnerability-related.DiscoverVulnerabilitytowards the end of February by Samuel Huckins of security company Rapid7 , and Fuze had disabledVulnerability-related.DiscoverVulnerabilityaccess to recorded meetings by the beginning of March . An update to version 4.3.1 of the Fuze platform on March 10 rectifiedVulnerability-related.PatchVulnerabilitythe issue . `` Security is a top priority for Fuze and we appreciate Rapid7 identifyingVulnerability-related.DiscoverVulnerabilitythis issue and bringing it to our attention . When we were informedVulnerability-related.DiscoverVulnerabilityby the Rapid7 team of the issue , we took immediate action and have resolvedVulnerability-related.PatchVulnerabilitythe problem , '' Fuze said in a statement . The vulnerability was caused by the way in which the platform incrementally added digits to the URL of recorded meetings , which resulted in relatively easy brute-force attacks proving successful . Combining the simple ability to guess URLs by inputting seven digit numbers with no requirement for authentication was always going to bring the potential for disaster , though there 's no suggestion that anyone with nefarious intent accessed any of the meetings . `` Recorded Fuze meetings are saved to Fuze 's cloud hosting service . They could be accessed by URLs such as 'https : //browser.fuzemeeting.com/ ? replayId=7DIGITNUM ' , where '7DIGITNUM ' is a seven digit number that increments over time , '' Rapid7 explains . `` Since this identifier did not provide sufficient keyspace to resist bruteforcing , specific meetings could be accessed and downloaded by simply guessing a replay ID reasonably close to the target , and iterating through all likely seven digit numbers . This format and lack of authentication also allowed one to find recordings via search engines such as Google . ''