aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

[TOTAL_TRACKED]
2,650
[LAST_24H]
1
[LAST_7D]
156
Daily BriefingSunday, March 29, 2026
>

Bluesky Launches AI-Powered Feed Customization Tool: Bluesky released Attie, an AI assistant that lets users create custom content feeds by describing what they want in plain language rather than adjusting technical settings. The tool runs on Claude (Anthropic's language model) and will integrate into apps built on Bluesky's AT Protocol.

Latest Intel

page 237/265
VIEW ALL
01

CVE-2021-41207: TensorFlow is an open source platform for machine learning. In affected versions the implementation of `ParallelConcat`

security
Nov 5, 2021

TensorFlow, an open source platform for machine learning, has a vulnerability in its `ParallelConcat` function that lacks proper input validation and can cause a division by zero error (a crash caused by dividing a number by zero). The affected versions have known fixes available through updates to TensorFlow 2.7.0 and earlier supported versions.

Critical This Week5 issues
critical

CVE-2026-33873: Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.9.0, the Agentic Assis

CVE-2026-33873NVD/CVE DatabaseMar 27, 2026
Mar 27, 2026

Fix: Update to TensorFlow 2.7.0. For users on earlier versions still in the supported range, apply patches for TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4. The fix is available in the commit: https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235

NVD/CVE Database
02

CVE-2021-41206: TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missi

security
Nov 5, 2021

TensorFlow, a machine learning platform, has a vulnerability (CVE-2021-41206) where certain operations don't properly check the size and dimensions of tensor arguments (the numerical arrays that machine learning models process). This missing validation can cause crashes, memory corruption (reads and writes to unintended memory locations), or other undefined behavior depending on which operation is affected.

Fix: The fixes will be included in TensorFlow 2.7.0. Patches will also be backported to TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database
03

CVE-2021-41202: TensorFlow is an open source platform for machine learning. In affected versions while calculating the size of the outpu

security
Nov 5, 2021

TensorFlow, an open source platform for machine learning, has a bug in its `tf.range` function where a conditional statement mixes two different number types (int64, a large integer type, and double, a decimal number type). Due to how C++ automatically converts between these types, the calculation overflows (produces incorrect results that are too large to store). This causes the output size calculation to fail.

Fix: The fix will be included in TensorFlow 2.7.0. The fix will also be backported (applied to older versions still being supported) in TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database
04

CVE-2021-41226: TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseBinCount`

security
Nov 5, 2021

TensorFlow, an open source platform for machine learning, has a vulnerability in its `SparseBinCount` function that allows heap OOB access (out-of-bounds memory access, where a program reads data outside the memory it's allowed to use) because it doesn't validate that the `values` argument matches the shape of the sparse output. This bug could let attackers crash the system or potentially read sensitive data from memory.

Fix: The fix is included in TensorFlow 2.7.0 and has been backported to TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4. Users should update to one of these patched versions.

NVD/CVE Database
05

CVE-2021-41224: TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseFillEmptyR

security
Nov 5, 2021

TensorFlow, an open source machine learning platform, has a vulnerability in the `SparseFillEmptyRows` function that can cause a heap OOB access (out-of-bounds read, where a program tries to read memory it shouldn't access) when the size of `indices` does not match the size of `values`. This is a memory safety bug that could potentially crash the program or expose sensitive data.

Fix: The fix will be included in TensorFlow 2.7.0. The vulnerability is also addressed in TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4 through a cherry-picked commit (a targeted code fix applied to older versions). Users should update to one of these patched versions.

NVD/CVE Database
06

CVE-2021-41223: TensorFlow is an open source platform for machine learning. In affected versions the implementation of `FusedBatchNorm`

security
Nov 5, 2021

TensorFlow, an open source machine learning platform, has a vulnerability in its `FusedBatchNorm` kernels that allows heap OOB access (out-of-bounds memory reading, where a program tries to read data outside the memory space it's allowed to use). This bug affects multiple older versions of TensorFlow that are still supported.

Fix: The fix will be included in TensorFlow 2.7.0. The commit will also be cherry-picked (applied retroactively) to TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database
07

CVE-2021-41219: TensorFlow is an open source platform for machine learning. In affected versions the code for sparse matrix multiplicati

security
Nov 5, 2021

TensorFlow, an open source platform for machine learning, has a vulnerability in its sparse matrix multiplication code where it can crash or behave unpredictably (undefined behavior) if matrix dimensions are 0 or less, because the code tries to write to an empty memory location (nullptr, a reference to nothing). When dimensions are invalid, the code should create an empty output but not write to it, otherwise it causes a heap OOB access (writing data outside the boundaries of allocated memory).

Fix: The fix will be included in TensorFlow 2.7.0. The patch will also be backported (applied to older versions) in TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database
08

CVE-2021-41217: TensorFlow is an open source platform for machine learning. In affected versions the process of building the control flo

security
Nov 5, 2021

TensorFlow, an open source machine learning platform, has a vulnerability where the code that builds a control flow graph (the structure representing how data moves through a model) crashes when it assumes paired nodes exist but they don't. When the first node in a pair is missing, the code tries to use a null pointer (a reference to nothing), causing the program to crash.

Fix: The fix will be included in TensorFlow 2.7.0. The fix will also be backported (applied to older versions still receiving updates) in TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database
09

CVE-2021-41215: TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `Deseriali

security
Nov 5, 2021

TensorFlow, an open source machine learning platform, has a vulnerability where the shape inference code for `DeserializeSparse` (a function that converts serialized data back into sparse tensors, which are data structures that efficiently store mostly-empty matrices) can crash due to a null pointer dereference (trying to access memory that hasn't been allocated). This happens because the code incorrectly assumes the input tensor has a specific structure.

Fix: The fix will be included in TensorFlow 2.7.0. The patch will also be applied to TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database
10

CVE-2021-41214: TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `tf.ragged

security
Nov 5, 2021

TensorFlow, an open source machine learning platform, has a bug in its shape inference code for the `tf.ragged.cross` function where it tries to use a null pointer (a reference to nothing), causing undefined behavior. The vulnerability is caused by accessing an uninitialized pointer (a memory location that hasn't been set up yet).

Fix: The fix will be included in TensorFlow 2.7.0. Patches will also be backported (applied to earlier versions) to TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database
Prev1...235236237238239...265Next
critical

Attackers exploit critical Langflow RCE within hours as CISA sounds alarm

CSO OnlineMar 27, 2026
Mar 27, 2026
critical

CVE-2025-53521: F5 BIG-IP Unspecified Vulnerability

CVE-2025-53521CISA Known Exploited VulnerabilitiesMar 26, 2026
Mar 26, 2026
critical

CISA: New Langflow flaw actively exploited to hijack AI workflows

BleepingComputerMar 26, 2026
Mar 26, 2026
critical

GHSA-mxrg-77hm-89hv: n8n: Prototype Pollution in XML and GSuiteAdmin node parameters lead to RCE

CVE-2026-33696GitHub Advisory DatabaseMar 26, 2026
Mar 26, 2026