aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

[TOTAL_TRACKED]
2,653
[LAST_24H]
4
[LAST_7D]
157
Daily BriefingSunday, March 29, 2026
>

Bluesky Launches AI-Powered Feed Customization Tool: Bluesky released Attie, an AI assistant that lets users create custom content feeds by describing what they want in plain language rather than adjusting technical settings. The tool runs on Claude (Anthropic's language model) and will integrate into apps built on Bluesky's AT Protocol.

Latest Intel

page 230/266
VIEW ALL
01

CVE-2022-23595: Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are

security
Feb 4, 2022

TensorFlow (an open source machine learning framework) has a vulnerability where building an XLA compilation cache (a storage system that speeds up machine learning model compilation) with default settings causes a null pointer dereference (a crash that happens when code tries to use a memory location that doesn't exist). This occurs because the default configuration allows all devices, leaving a critical variable empty.

Critical This Week5 issues
critical

CVE-2026-33873: Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.9.0, the Agentic Assis

CVE-2026-33873NVD/CVE DatabaseMar 27, 2026
Mar 27, 2026

Fix: The fix will be included in TensorFlow 2.8.0. Patches will also be released in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database
02

CVE-2022-23594: Tensorflow is an Open Source Machine Learning Framework. The TFG dialect of TensorFlow (MLIR) makes several assumptions

security
Feb 4, 2022

TensorFlow (an open-source machine learning framework) has a vulnerability in its TFG dialect, which is part of MLIR (a compiler framework for optimizing code). An attacker can modify the SavedModel format (the way trained models are saved to disk) to break assumptions the system makes, which can crash the Python interpreter or cause heap OOB (out-of-bounds memory access, where code reads or writes memory it shouldn't).

NVD/CVE Database
03

CVE-2022-23593: Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function in the MLIR-TFRT infrastructur

security
Feb 4, 2022

TensorFlow, an open-source machine learning framework, has a vulnerability in its `simplifyBroadcast` function (a part of the MLIR-TFRT infrastructure, which is the compiler and runtime system) that causes a segfault (a crash from accessing invalid memory) when given scalar shapes (data without dimensions), resulting in a denial of service (making the system unavailable). This affects only TensorFlow version 2.7.0.

Fix: The fix will be included in TensorFlow 2.8.0.

NVD/CVE Database
04

CVE-2022-23592: Tensorflow is an Open Source Machine Learning Framework. TensorFlow's type inference can cause a heap out of bounds read

security
Feb 4, 2022

TensorFlow (an open-source machine learning framework) has a vulnerability where type inference can read data outside the bounds of allocated memory (a heap out of bounds read). The bounds checking uses a DCHECK, which is disabled in production code, allowing an attacker to manipulate a variable so it accesses memory beyond what is available.

Fix: The fix will be included in TensorFlow 2.8.0.

NVD/CVE Database
05

CVE-2022-23591: Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursi

security
Feb 4, 2022

TensorFlow (an open-source machine learning framework) has a vulnerability where the GraphDef format (TensorFlow's way of representing computation graphs) can accept self-recursive functions even though it shouldn't, causing a stack overflow (a crash from too much memory use) when the model runs because the system gets stuck trying to resolve the same function repeatedly.

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be backported to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database
06

CVE-2022-23590: Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `SavedModel` can be maliciously

security
Feb 4, 2022

TensorFlow (an open source machine learning framework) has a vulnerability where a maliciously altered GraphDef (a representation of a machine learning model's computation graph) from a SavedModel can crash a TensorFlow process by forcing extraction of a value from a StatusOr (a data structure that holds either a valid result or an error state). The issue affects both TensorFlow 2.7 and 2.8 versions.

Fix: The issue has been patched in TensorFlow 2.8.0 and TensorFlow 2.7.1. Users should upgrade to these versions or later.

NVD/CVE Database
07

CVE-2022-23589: Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can t

security
Feb 4, 2022

TensorFlow, a machine learning framework, has a vulnerability (CVE-2022-23589) in its Grappler component (a graph optimization tool) that can cause a null pointer dereference (crash from accessing invalid memory) when processing maliciously altered SavedModel files (serialized machine learning models). The bug occurs in two places during optimization operations and can be triggered by missing required nodes in the computation graph.

Fix: The fix will be included in TensorFlow 2.8.0. The patch will also be backported to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database
08

CVE-2022-23588: Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `S

security
Feb 4, 2022

A malicious user can crash TensorFlow (an open source machine learning framework) by modifying a SavedModel (a pre-trained model file) in a way that tricks the Grappler optimizer (a tool that improves model performance) into building a tensor with an invalid reference dtype (data type), causing the program to fail.

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be applied to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database
09

CVE-2022-23587: Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow is vu

security
Feb 4, 2022

TensorFlow, an open-source machine learning framework, has a vulnerability in its Grappler component (a tool that optimizes computational graphs) that causes an integer overflow (when a number becomes too large to store) during cost estimation for crop and resize operations. Since attackers can control the cropping parameters, they can trigger undefined behavior (unpredictable actions that may crash the system or cause other problems).

Fix: The fix will be included in TensorFlow 2.8.0. This commit will also be applied to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these versions are still supported.

NVD/CVE Database
10

CVE-2022-23586: Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `S

security
Feb 4, 2022

A vulnerability in TensorFlow (an open-source machine learning framework) allows an attacker to cause a denial of service by modifying a SavedModel (a packaged version of a trained model) in a way that triggers false assertions in the code and crashes the Python interpreter. This vulnerability affects multiple versions of TensorFlow.

Fix: Update to TensorFlow 2.8.0, or apply the fix through updates to TensorFlow 2.7.1, TensorFlow 2.6.3, or TensorFlow 2.5.3. Patches are available in the following commits: 3d89911481ba6ebe8c88c1c0b595412121e6c645 and dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2.

NVD/CVE Database
Prev1...228229230231232...266Next
critical

Attackers exploit critical Langflow RCE within hours as CISA sounds alarm

CSO OnlineMar 27, 2026
Mar 27, 2026
critical

CVE-2025-53521: F5 BIG-IP Unspecified Vulnerability

CVE-2025-53521CISA Known Exploited VulnerabilitiesMar 26, 2026
Mar 26, 2026
critical

CISA: New Langflow flaw actively exploited to hijack AI workflows

BleepingComputerMar 26, 2026
Mar 26, 2026
critical

GHSA-mxrg-77hm-89hv: n8n: Prototype Pollution in XML and GSuiteAdmin node parameters lead to RCE

CVE-2026-33696GitHub Advisory DatabaseMar 26, 2026
Mar 26, 2026