aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI Sec Watch

The security intelligence platform for AI teams

AI security threats move fast and get buried under hype and noise. Built by an Information Systems Security researcher to help security teams and developers stay ahead of vulnerabilities, privacy incidents, safety research, and policy developments.

Independent research. No sponsors, no paywalls, no conflicts of interest.

[TOTAL_TRACKED]
3,710
[LAST_24H]
1
[LAST_7D]
1
Daily BriefingFriday, May 8, 2026
>

Critical RCE Vulnerabilities in LiteLLM Proxy Server: LiteLLM, a proxy server that forwards requests to AI model APIs, disclosed three critical and high-severity flaws in versions 1.74.2 through 1.83.6. Two test endpoints allowed attackers with valid API keys to execute arbitrary code (running any commands an attacker wants) on the server by submitting malicious configurations or prompt templates without sandboxing (CVE-2026-42271, CVE-2026-42203, both critical), while a SQL injection flaw (inserting malicious code into database queries) let unauthenticated attackers read or modify stored API credentials (CVE-2026-42208, high).

>

ClaudeBleed Exploit Allows Extension Hijacking in Chrome: Anthropic's Claude browser extension contains a vulnerability that allows malicious Chrome extensions to hijack it and perform unauthorized actions like exfiltrating files, sending emails, or stealing code from private repositories. The flaw stems from the extension trusting any script from claude.ai without verifying the actual caller, and while Anthropic released a partial fix in version 1.0.70 on May 6, researchers report it remains exploitable when the extension runs in privileged mode.

Latest Intel

page 338/371
VIEW ALL
01

CVE-2022-23572: Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorFlow can fail to specialize a ty

security
Feb 4, 2022

TensorFlow (an open source machine learning framework) has a bug where it sometimes fails to determine data types correctly during shape inference (the process of figuring out what dimensions data will have). The bug is hidden in production builds because assertion checks are disabled, causing the program to crash when it tries to use an error result as if it were valid data.

>

AI Systems Show Triple the High-Risk Vulnerabilities of Legacy Software: Penetration testing data reveals that AI and LLM systems have 32% of findings rated high-risk compared to just 13% for traditional software, with only 38% of high-risk AI issues getting resolved. Security experts attribute this gap to rapid deployment without mature controls, novel attack surfaces like prompt injection (tricking AI by hiding instructions in input), and fragmented responsibility for remediation across teams.

>

Model Context Protocol Emerging as Critical Security Blind Spot: Model Context Protocol (MCP, a plugin system connecting AI agents to external tools) has become a major vulnerability vector as organizations fail to scan for or monitor MCP-related risks. Recent supply chain attacks, such as the postmark-mcp npm package that exfiltrated emails from 300 organizations, demonstrate how attackers exploit widely-trusted MCP packages and hardcoded credentials in AI configurations to enable credential theft and supply chain compromises at scale.

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be applied to TensorFlow 2.7.1 and TensorFlow 2.6.3, which are still in the supported range.

NVD/CVE Database
02

CVE-2022-23571: Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can

security
Feb 4, 2022

TensorFlow (an open source machine learning framework) has a vulnerability where attackers can crash TensorFlow processes by sending specially crafted data with invalid tensor types or shapes during decoding from protobuf (a data format used to serialize structured data). This is a denial of service attack, meaning the attacker can make the system stop working rather than gain unauthorized access.

Fix: The fix will be included in TensorFlow 2.8.0. The vulnerability will also be patched in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database
03

CVE-2022-23570: Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, TensorFlow might do a nul

security
Feb 4, 2022

TensorFlow, an open-source machine learning framework, has a bug where it can crash or behave unpredictably when decoding certain data structures (protobuf, a format for storing structured data) if some required information is missing. The problem occurs because the code only checks for this issue in debug builds (test versions), not in production builds (versions used in real applications), so real users may experience crashes or undefined behavior.

Fix: The fix will be included in TensorFlow 2.8.0. TensorFlow 2.7.1 and TensorFlow 2.6.3 will also receive this fix through a cherrypick (backporting the fix to older supported versions).

NVD/CVE Database
04

CVE-2022-23566: Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The

security
Feb 4, 2022

TensorFlow, an open-source machine learning framework, has a vulnerability in its Grappler component where the `set_output` function can write data to an array at any index specified by an attacker, creating a heap OOB write (out-of-bounds write, where data is written to memory locations it shouldn't access). This gives a malicious user the ability to write arbitrary data to unintended memory locations.

Fix: The fix will be included in TensorFlow 2.8.0. TensorFlow 2.7.1, 2.6.3, and 2.5.3 will also receive the fix via a cherry-pick (applying specific code changes to older versions), as these versions are still supported and also affected.

NVD/CVE Database
05

CVE-2022-23565: Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure

security
Feb 4, 2022

TensorFlow (an open-source machine learning framework) has a vulnerability where an attacker can crash the system by modifying a SavedModel file on disk to contain duplicate operation attributes, triggering an assertion failure (a built-in check that causes the program to stop if a condition is false). This is a denial of service attack (making a system unavailable to legitimate users).

Fix: Update to TensorFlow 2.8.0 or apply the patch from the commit at https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0. The fix will also be included in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database
06

CVE-2022-23564: Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle tensor from protobuf, a TensorF

security
Feb 4, 2022

TensorFlow (an open source machine learning framework) has a vulnerability where attackers can crash TensorFlow processes by providing specially crafted input when the system converts protobuf (a data format) into resource handle tensors, because a validation check can be bypassed through user-controlled arguments.

Fix: Update to TensorFlow 2.8.0, or apply cherrypicked fixes available in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database
07

CVE-2022-23563: Tensorflow is an Open Source Machine Learning Framework. In multiple places, TensorFlow uses `tempfile.mktemp` to create

security
Feb 4, 2022

TensorFlow, an open-source machine learning framework, uses an unsafe function called `tempfile.mktemp` to create temporary files in multiple places. This creates a race condition vulnerability (TOC/TOU, a timing gap where another process can interfere between when the system checks if a filename exists and when it actually creates the file), which is especially dangerous in utility and library code rather than just testing code.

Fix: The source states: "We have patched the issue in several commits, replacing `mktemp` with the safer `mkstemp`/`mkdtemp` functions, according to the usage pattern. Users are advised to upgrade as soon as possible."

NVD/CVE Database
08

CVE-2022-23562: Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. T

security
Feb 4, 2022

TensorFlow (an open-source framework for building machine learning models) has a vulnerability in its Range function where integer overflows (when numbers get too large and wrap around to incorrect values) can cause undefined behavior or extremely large memory allocations. This bug affects multiple versions of the software.

Fix: The fix will be included in TensorFlow 2.8.0. The vulnerability will also be patched in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, which are still supported versions.

NVD/CVE Database
09

CVE-2022-23561: Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause a write o

security
Feb 4, 2022

An attacker can create a malicious TFLite model (a compressed machine learning format for mobile devices) that writes data outside the boundaries of an array in TensorFlow, potentially overwriting the memory allocator's linked list (a data structure that tracks available memory) to achieve arbitrary write access to system memory. This vulnerability affects multiple versions of TensorFlow, an open-source framework for building AI systems.

Fix: The fix will be included in TensorFlow 2.8.0. The same fix will also be cherry-picked (backported) to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database
10

CVE-2022-23560: Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would allow limited r

security
Feb 4, 2022

TensorFlow, an open-source machine learning framework, has a vulnerability in TFLite (TensorFlow Lite, a lightweight version for mobile devices) where an attacker can create a specially crafted model that allows limited reads and writes outside of arrays by exploiting missing validation during conversion from sparse tensors (data structures with mostly empty values) to dense tensors (fully populated data structures). This vulnerability affects multiple versions of TensorFlow.

Fix: Upgrade to TensorFlow 2.8.0. For users on earlier supported versions, patches are also available in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3. Users are advised to upgrade as soon as possible.

NVD/CVE Database
Prev1...336337338339340...371Next