aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingSunday, May 17, 2026

No new AI/LLM security issues were identified today.

Latest Intel

page 261/371
VIEW ALL
01

CVE-2025-23310: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause stack buffer

security
Aug 6, 2025

NVIDIA Triton Inference Server (software that runs AI models for prediction tasks) for Windows and Linux has a vulnerability where attackers can send specially crafted inputs to cause a stack buffer overflow (writing data beyond allocated memory limits), potentially leading to remote code execution (running commands on the affected system), denial of service (making the system unavailable), information disclosure, and data tampering. The vulnerability has a CVSS score (severity rating) of 4.0.

NVD/CVE Database
02

CVE-2025-5197: A Regular Expression Denial of Service (ReDoS) vulnerability exists in the Hugging Face Transformers library, specifical

security
Aug 6, 2025

A ReDoS vulnerability (regular expression denial of service, where a specially crafted input causes a regex pattern to consume excessive CPU) exists in Hugging Face Transformers library version 4.51.3 and earlier, in a function that converts TensorFlow model weight names to PyTorch format. An attacker can exploit this with malicious input strings to crash services or exhaust system resources.

Fix: Update to version 4.53.0 or later, which fixes the vulnerability.

NVD/CVE Database
03

I Spent $500 To Test Devin AI For Prompt Injection So That You Don't Have To

security
Aug 6, 2025

Devin AI, a tool that acts as an AI software engineer, is vulnerable to prompt injection (tricking an AI by hiding malicious instructions in its input) attacks that can lead to full system compromise. By planting malicious instructions on websites or GitHub issues that Devin reads, attackers can trick it into downloading and running malware, giving them remote control over Devin's DevBox (the sandboxed environment where Devin operates) and access to any stored secrets.

Embrace The Red
04

Amp Code: Arbitrary Command Execution via Prompt Injection Fixed

securitysafety
Aug 5, 2025

Amp, an AI coding agent by Sourcegraph, had a vulnerability where it could modify its own configuration files to enable arbitrary command execution (running any code on a developer's machine) through two methods: adding bash commands to an allowlist or installing malicious MCP servers (external programs the AI can invoke). This could be exploited by the AI itself or through prompt injection attacks (tricking the AI by hiding malicious instructions in its input).

Fix: Make sure to run the latest version Amp ships frequently. The vulnerability was identified in early July, reported to Sourcegraph, and promptly fixed by the Amp team.

Embrace The Red
05

CVE-2025-54868: LibreChat is a ChatGPT clone with additional features. In versions 0.0.6 through 0.7.7-rc1, an exposed testing endpoint

security
Aug 5, 2025

LibreChat (a ChatGPT-like application) versions 0.0.6 through 0.7.7-rc1 have a vulnerability where an exposed testing endpoint called /api/search/test allows anyone to read chat messages from any user by directly accessing the Meilisearch engine (a search database) without proper permission checks. This is a serious security flaw because it exposes private conversations.

Fix: This issue is fixed in version 0.7.7. Users should upgrade to version 0.7.7 or later.

NVD/CVE Database
06

CVE-2025-54795: Claude Code is an agentic coding tool. In versions below 1.0.20, an error in command parsing makes it possible to bypass

security
Aug 4, 2025

Claude Code is an agentic coding tool (software that can automatically write and execute code). In versions before 1.0.20, a flaw in how the tool parses commands allows attackers to skip the confirmation prompt that normally protects users before running untrusted code. Exploiting this requires the attacker to insert malicious content into Claude Code's input.

Fix: This is fixed in version 1.0.20. Users should update Claude Code to version 1.0.20 or later.

NVD/CVE Database
07

CVE-2025-54794: Claude Code is an agentic coding tool. In versions below 0.2.111, a path validation flaw using prefix matching instead o

security
Aug 4, 2025

Claude Code, an agentic coding tool (software that can write and modify code automatically), has a path validation flaw in versions before 0.2.111 that allows attackers to bypass directory restrictions and access files outside the intended working directory. The vulnerability exploits prefix matching (checking if one string starts with another) instead of properly comparing full file paths, and requires the attacker to create a directory with the same prefix name and inject untrusted content into the tool's context.

Fix: Update Claude Code to version 0.2.111 or later, as this version contains the fix for the path validation flaw.

NVD/CVE Database
08

CVE-2025-54135: Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in

security
Aug 4, 2025

Cursor, a code editor designed for AI-assisted programming, has a vulnerability in versions below 1.3.9 where it can write files in a workspace without asking the user for permission. An attacker can exploit this by using prompt injection (tricking the AI by hiding instructions in its input) to create sensitive configuration files like .cursor/mcp.json, potentially gaining RCE (remote code execution, where an attacker can run commands on a system they don't own) on the victim's computer without approval.

Fix: Update Cursor to version 1.3.9 or later, where this vulnerability is fixed.

NVD/CVE Database
09

CVE-2025-54130: Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in

security
Aug 4, 2025

Cursor, a code editor designed for AI-assisted programming, has a vulnerability in versions before 1.3.9 where it can write files to a workspace without asking the user for permission. An attacker can exploit this by using prompt injection (tricking the AI by hiding instructions in its input) combined with this flaw to modify editor configuration files and achieve RCE (remote code execution, where an attacker can run commands on a system they don't own) without the user's knowledge.

Fix: Update Cursor to version 1.3.9 or later, where this vulnerability is fixed.

NVD/CVE Database
10

Differential Privacy in Practice: Lessons Learned From 10 Years of Real-World Applications

securityprivacy
Aug 4, 2025

Differential privacy (DP, a mathematical technique that adds controlled randomness to data to protect individual privacy while keeping data useful) is a widely-used method for protecting sensitive information, but putting it into practice in real-world systems has proven difficult. Researchers analyzed 21 actual deployments of differential privacy by major companies and institutions over the last ten years to understand what works and what doesn't.

IEEE Xplore (Security & AI Journals)
Prev1...259260261262263...371Next