aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

[TOTAL_TRACKED]
2,736
[LAST_24H]
43
[LAST_7D]
180
Daily BriefingWednesday, April 1, 2026
>

Claude Code Source Leaked via npm Packaging Error: Anthropic confirmed that nearly 2,000 TypeScript files (over 512,000 lines of code) from Claude Code were accidentally exposed through a JavaScript package repository, revealing internal features and allowing attackers to study how to bypass safeguards. Users who downloaded the affected package during a specific window on March 31, 2026 may have also received malware-infected software.

>

Google Addresses Vertex AI Security Issues After Weaponization Demo: Palo Alto Networks researchers demonstrated how to weaponize AI agents (autonomous programs that perform tasks with minimal human input) on Google Cloud's Vertex AI platform, prompting Google to begin addressing the disclosed security problems.

>

Latest Intel

page 163/274
VIEW ALL
01

CVE-2025-23321: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause a divide by zero

security
Aug 6, 2025

NVIDIA Triton Inference Server (software that runs AI models on Windows and Linux computers) contains a vulnerability where a user can send a specially crafted invalid request that causes a divide by zero error (attempting to divide a number by zero, which crashes the system). This could allow an attacker to cause a denial of service attack (making the service unavailable to legitimate users).

Critical This Week5 issues
critical

CVE-2026-34162: FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT HTTP tools testing endpoint (/api/core/

CVE-2026-34162NVD/CVE DatabaseMar 31, 2026
Mar 31, 2026

Meta Smartglasses Raise Privacy Concerns with Covert Recording: Meta's smartglasses feature a built-in camera and AI assistant that can describe surroundings and answer questions, but raise significant privacy issues because they can record video of others without knowledge or consent.

NVD/CVE Database
02

CVE-2025-23320: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker c

security
Aug 6, 2025

NVIDIA Triton Inference Server for Windows and Linux has a vulnerability in its Python backend where an attacker can send an extremely large request to exceed the shared memory limit (a pool of fast memory shared between processes), potentially exposing sensitive information. The vulnerability has a CVSS 4.0 severity rating, which measures how serious security flaws are on a scale of 0-10.

NVD/CVE Database
03

CVE-2025-23319: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker c

security
Aug 6, 2025

NVIDIA Triton Inference Server for Windows and Linux has a vulnerability in its Python backend where an attacker can send a specially crafted request to cause an out-of-bounds write (writing data outside the intended memory location). This could allow remote code execution (running malicious commands on the system), denial of service (making the system unavailable), data tampering (changing data), or information disclosure (exposing sensitive information).

NVD/CVE Database
04

CVE-2025-23318: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker c

security
Aug 6, 2025

CVE-2025-23318 is a vulnerability in NVIDIA Triton Inference Server (a tool that runs AI models for predictions) on Windows and Linux where an attacker could cause an out-of-bounds write (writing data outside the intended memory location) in the Python backend component. If successfully exploited, this could allow an attacker to execute code, crash the system, change data, or steal information.

NVD/CVE Database
05

CVE-2025-23317: NVIDIA Triton Inference Server contains a vulnerability in the HTTP server, where an attacker could start a reverse shel

security
Aug 6, 2025

NVIDIA Triton Inference Server has a vulnerability in its HTTP server (CVE-2025-23317) where an attacker could send a specially crafted HTTP request to start a reverse shell (a remote connection giving the attacker control of the system). This could allow remote code execution (running commands on a system without permission), denial of service (making the system unavailable), data tampering, or information disclosure.

NVD/CVE Database
06

CVE-2025-23311: NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a stack overflow through specially

security
Aug 6, 2025

NVIDIA Triton Inference Server has a vulnerability (CVE-2025-23311) where an attacker can send specially crafted HTTP requests to cause a stack overflow (a memory error where too much data is written to a limited storage area). This could allow remote code execution (running malicious commands on the server), denial of service (making the server unavailable), information disclosure (leaking data), or data tampering (modifying stored information).

NVD/CVE Database
07

CVE-2025-23310: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause stack buffer

security
Aug 6, 2025

NVIDIA Triton Inference Server (software that runs AI models for prediction tasks) for Windows and Linux has a vulnerability where attackers can send specially crafted inputs to cause a stack buffer overflow (writing data beyond allocated memory limits), potentially leading to remote code execution (running commands on the affected system), denial of service (making the system unavailable), information disclosure, and data tampering. The vulnerability has a CVSS score (severity rating) of 4.0.

NVD/CVE Database
08

CVE-2025-5197: A Regular Expression Denial of Service (ReDoS) vulnerability exists in the Hugging Face Transformers library, specifical

security
Aug 6, 2025

A ReDoS vulnerability (regular expression denial of service, where a specially crafted input causes a regex pattern to consume excessive CPU) exists in Hugging Face Transformers library version 4.51.3 and earlier, in a function that converts TensorFlow model weight names to PyTorch format. An attacker can exploit this with malicious input strings to crash services or exhaust system resources.

Fix: Update to version 4.53.0 or later, which fixes the vulnerability.

NVD/CVE Database
09

I Spent $500 To Test Devin AI For Prompt Injection So That You Don't Have To

security
Aug 6, 2025

Devin AI, a tool that acts as an AI software engineer, is vulnerable to prompt injection (tricking an AI by hiding malicious instructions in its input) attacks that can lead to full system compromise. By planting malicious instructions on websites or GitHub issues that Devin reads, attackers can trick it into downloading and running malware, giving them remote control over Devin's DevBox (the sandboxed environment where Devin operates) and access to any stored secrets.

Embrace The Red
10

Amp Code: Arbitrary Command Execution via Prompt Injection Fixed

securitysafety
Aug 5, 2025

Amp, an AI coding agent by Sourcegraph, had a vulnerability where it could modify its own configuration files to enable arbitrary command execution (running any code on a developer's machine) through two methods: adding bash commands to an allowlist or installing malicious MCP servers (external programs the AI can invoke). This could be exploited by the AI itself or through prompt injection attacks (tricking the AI by hiding malicious instructions in its input).

Fix: Make sure to run the latest version Amp ships frequently. The vulnerability was identified in early July, reported to Sourcegraph, and promptly fixed by the Amp team.

Embrace The Red
Prev1...161162163164165...274Next
critical

CVE-2025-15379: A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_

CVE-2025-15379NVD/CVE DatabaseMar 30, 2026
Mar 30, 2026
critical

CVE-2026-33873: Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.9.0, the Agentic Assis

CVE-2026-33873NVD/CVE DatabaseMar 27, 2026
Mar 27, 2026
critical

Attackers exploit critical Langflow RCE within hours as CISA sounds alarm

CSO OnlineMar 27, 2026
Mar 27, 2026
critical

CVE-2025-53521: F5 BIG-IP Unspecified Vulnerability

CVE-2025-53521CISA Known Exploited VulnerabilitiesMar 26, 2026
Mar 26, 2026