aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

[TOTAL_TRACKED]
2,649
[LAST_24H]
0
[LAST_7D]
158
Daily BriefingSaturday, March 28, 2026
>

OpenAI Shuts Down Sora Video App Over Profitability Concerns: OpenAI discontinued its Sora video-generation app and canceled a $1 billion Disney partnership because the service consumed too many computational resources without generating enough revenue to justify costs as the company prioritizes profitability.

>

Critical Injection Vulnerability in localGPT LLM Tool: CVE-2026-5002 allows remote injection attacks (inserting malicious code into input) through the LLM Prompt Handler in PromtEngineer localGPT's backend. The exploit code is publicly available, and the vendor has not responded to disclosure attempts.

>

Latest Intel

page 251/265
VIEW ALL
01

CVE-2021-29565: TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereferenc

security
May 14, 2021

TensorFlow, an open-source machine learning platform, has a vulnerability (CVE-2021-29565) where a null pointer dereference (a crash caused by the program trying to use memory it shouldn't access) can occur in the `tf.raw_ops.SparseFillEmptyRows` function if an attacker provides an empty `dense_shape` tensor due to missing validation checks. This flaw affects multiple versions of TensorFlow and could allow an attacker to crash the program.

Critical This Week5 issues
critical

CVE-2026-33873: Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.9.0, the Agentic Assis

CVE-2026-33873NVD/CVE DatabaseMar 27, 2026
Mar 27, 2026

Political Deepfakes Gain Influence Despite Public Awareness: AI researchers found that creators use generative AI (technology that creates images or videos from text descriptions) to produce fake media of political figures for propaganda and profit, and these deepfakes shape public perception even when viewers know the content is fake.

>

TikTok's AI Ad Labels Failing in Practice: Major companies like Samsung are posting AI-generated ads on TikTok without the required disclosure labels, preventing users from identifying whether advertisements were created by AI or humans despite platform policies requiring transparency.

Fix: The fix will be included in TensorFlow 2.5.0. It will also be backported (ported to earlier versions) to TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3, and TensorFlow 2.1.4.

NVD/CVE Database
02

CVE-2021-29564: TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereferenc

security
May 14, 2021

TensorFlow, a machine learning platform, has a vulnerability in its EditDistance function where attackers can cause a null pointer dereference (a crash caused by accessing memory that doesn't exist) by sending specially crafted input parameters that don't get validated properly. The vulnerability allows attackers to potentially crash or disrupt TensorFlow applications.

Fix: The fix will be included in TensorFlow 2.5.0. The vulnerability will also be patched in earlier supported versions: TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3, and TensorFlow 2.1.4.

NVD/CVE Database
03

CVE-2021-29563: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by expl

security
May 14, 2021

TensorFlow (an open source platform for machine learning) has a vulnerability where an attacker can crash the program by sending empty data to the RFFT function (a mathematical operation for transforming signals). The crash happens because the underlying code (Eigen, a math library) fails an assertion (a safety check) when it tries to process an empty matrix (a grid of numbers with no values).

Fix: The fix will be included in TensorFlow 2.5.0. The vulnerability will also be patched in earlier versions: TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3, and TensorFlow 2.1.4.

NVD/CVE Database
04

CVE-2021-29562: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by expl

security
May 14, 2021

TensorFlow (an open-source machine learning platform) has a vulnerability where an attacker can cause a denial of service (making a service unavailable) by triggering a CHECK-failure in the `tf.raw_ops.IRFFT` function, which is part of TensorFlow's low-level operations. This happens because of a reachable assertion (a check in the code that can be deliberately violated).

Fix: Update TensorFlow to version 2.5.0 or later. If you are using an older supported version, apply the patch available in TensorFlow 2.4.2, 2.3.3, 2.2.3, or 2.1.4, as these versions also received the fix through a cherrypick commit (the specific fix is available at https://github.com/tensorflow/tensorflow/commit/1c56f53be0b722ca657cbc7df461ed676c8642a2).

NVD/CVE Database
05

CVE-2021-29561: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by expl

security
May 14, 2021

CVE-2021-29561 is a vulnerability in TensorFlow (an open source machine learning platform) where an attacker can crash a program by sending an invalid tensor (a multi-dimensional array of numbers) to the `LoadAndRemapMatrix` function instead of the expected scalar value (a single number). This causes a validation check to fail and terminates the process, creating a denial of service attack (making the system unavailable).

Fix: The fix is included in TensorFlow 2.5.0. The vulnerability is also patched in TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3, and TensorFlow 2.1.4 through cherry-picked commits (applying specific fixes to older supported versions).

NVD/CVE Database
06

CVE-2021-29560: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `

security
May 14, 2021

TensorFlow, a machine learning platform, has a vulnerability where an attacker can cause a heap buffer overflow (memory corruption from writing past allocated memory limits) in the RaggedTensorToTensor function by providing specially crafted input shapes. The bug occurs because the code uses the same index to access two different arrays, and if one array is shorter than the other, it reads or writes to invalid memory locations.

Fix: The fix will be included in TensorFlow 2.5.0. Additionally, the commit fixing this issue will be cherry-picked (applied as a backport) to TensorFlow 2.4.2, 2.3.3, 2.2.3, and 2.1.4, which are all affected and still in the supported range.

NVD/CVE Database
07

CVE-2021-29559: TensorFlow is an end-to-end open source platform for machine learning. An attacker can access data outside of bounds of

security
May 14, 2021

TensorFlow, an open-source machine learning platform, has a vulnerability in the `tf.raw_ops.UnicodeEncode` function that allows attackers to read data outside the bounds of a heap allocated array (memory that a program has requested to store data). The problem occurs because the code assumes the input data describes a valid sparse tensor (a matrix with mostly empty values) without properly validating it first.

Fix: The fix will be included in TensorFlow 2.5.0. The fix will also be backported to TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3, and TensorFlow 2.1.4.

NVD/CVE Database
08

CVE-2021-29558: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `

security
May 14, 2021

TensorFlow, a machine learning platform, has a vulnerability where an attacker can cause a heap buffer overflow (a memory safety error where data is written outside its allocated space) in the `tf.raw_ops.SparseSplit` function by controlling an offset value that accesses an array.

Fix: The fix will be included in TensorFlow 2.5.0. The vulnerability will also be patched in TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3, and TensorFlow 2.1.4.

NVD/CVE Database
09

CVE-2021-29557: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a F

security
May 14, 2021

TensorFlow (an open-source machine learning platform) has a vulnerability where an attacker can crash a system by triggering a divide-by-zero error (FPE, or floating-point exception) in a specific operation called `tf.raw_ops.SparseMatMul` when given an empty tensor (a multidimensional array with no data). This causes a denial of service attack (making the system unavailable to legitimate users).

Fix: Update to TensorFlow 2.5.0 or later. If you cannot upgrade to 2.5.0, the fix will also be available in TensorFlow 2.4.2, 2.3.3, 2.2.3, or 2.1.4, depending on which version you currently use.

NVD/CVE Database
10

CVE-2021-29556: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a F

security
May 14, 2021

TensorFlow, an open source machine learning platform, has a vulnerability where an attacker can cause a denial of service (making a service unavailable) by triggering a FPE (floating-point exception, a math error that crashes a program) runtime error in a specific function called `tf.raw_ops.Reverse`. The bug happens because the code divides by the first dimension of a tensor (a multi-dimensional array of numbers) without properly checking if that dimension is zero.

Fix: The fix will be included in TensorFlow 2.5.0. The patch will also be applied to TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3, and TensorFlow 2.1.4.

NVD/CVE Database
Prev1...249250251252253...265Next
critical

Attackers exploit critical Langflow RCE within hours as CISA sounds alarm

CSO OnlineMar 27, 2026
Mar 27, 2026
critical

CVE-2025-53521: F5 BIG-IP Unspecified Vulnerability

CVE-2025-53521CISA Known Exploited VulnerabilitiesMar 26, 2026
Mar 26, 2026
critical

CISA: New Langflow flaw actively exploited to hijack AI workflows

BleepingComputerMar 26, 2026
Mar 26, 2026
critical

GHSA-mxrg-77hm-89hv: n8n: Prototype Pollution in XML and GSuiteAdmin node parameters lead to RCE

CVE-2026-33696GitHub Advisory DatabaseMar 26, 2026
Mar 26, 2026