aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

AI & LLM Vulnerabilities

Security vulnerabilities, privacy incidents, safety concerns, and policy updates affecting LLMs and AI agents.

to
Export CSV
1459 items

CVE-2025-23333: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker c

mediumvulnerability
security
Aug 6, 2025
CVE-2025-23333

NVIDIA Triton Inference Server for Windows and Linux has a vulnerability in its Python backend where an attacker could manipulate shared memory data to cause an out-of-bounds read (reading data from memory locations that should not be accessed). This vulnerability could potentially lead to information disclosure, meaning an attacker might be able to see sensitive data they shouldn't have access to.

NVD/CVE Database

CVE-2025-23331: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause a memory allocati

highvulnerability
security
Aug 6, 2025
CVE-2025-23331

NVIDIA Triton Inference Server (software that runs AI models on Windows and Linux) has a vulnerability where an attacker could send a specially crafted request that causes the server to try allocating an extremely large amount of memory, resulting in a crash (segmentation fault, which is when a program stops running due to a memory error). This could lead to a denial of service attack (making the service unavailable to legitimate users).

CVE-2025-23327: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause an integer o

highvulnerability
security
Aug 6, 2025
CVE-2025-23327

NVIDIA Triton Inference Server for Windows and Linux has a vulnerability where an attacker could cause an integer overflow (a bug where a number becomes too large for the system to handle properly) by sending specially crafted inputs, potentially leading to denial of service (making the service unavailable) and data tampering. The severity rating from NIST has not yet been assigned.

CVE-2025-23326: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause an integer o

highvulnerability
security
Aug 6, 2025
CVE-2025-23326

NVIDIA Triton Inference Server (software that runs AI models on servers) for Windows and Linux has a vulnerability where an attacker could send specially crafted input that causes an integer overflow (when a number calculation exceeds the maximum value a computer can store, causing unexpected behavior), potentially leading to a denial of service attack (making the service unavailable to legitimate users).

CVE-2025-23325: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause uncontrolled

highvulnerability
security
Aug 6, 2025
CVE-2025-23325

NVIDIA Triton Inference Server for Windows and Linux has a vulnerability where an attacker could send a specially crafted input that causes uncontrolled recursion (a function repeatedly calling itself without stopping), leading to a denial of service (DoS, making the service unavailable to legitimate users). The vulnerability has a CVSS 4.0 severity rating, though a full severity assessment from NIST has not yet been provided.

CVE-2025-23324: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause an integer overfl

highvulnerability
security
Aug 6, 2025
CVE-2025-23324

NVIDIA Triton Inference Server for Windows and Linux has a vulnerability where an integer overflow or wraparound (a mistake in how the software handles very large numbers, causing them to wrap around to negative values) can occur when a user sends an invalid request, potentially causing a segmentation fault (a crash where the program tries to access memory it shouldn't). This could allow an attacker to cause a denial of service (making the service unavailable to legitimate users).

CVE-2025-23323: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause an integer overfl

highvulnerability
security
Aug 6, 2025
CVE-2025-23323

NVIDIA Triton Inference Server for Windows and Linux has a vulnerability where an integer overflow or wraparound (a bug where a number gets too large and wraps around to a very small value) can occur when a user sends an invalid request, potentially causing a segmentation fault (a crash where the program tries to access memory it shouldn't) and leading to denial of service (making the service unavailable to legitimate users). The vulnerability has a CVSS 4.0 severity rating (a 0-10 scale measuring how serious a vulnerability is).

CVE-2025-23322: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where multiple requests could cause a doub

highvulnerability
security
Aug 6, 2025
CVE-2025-23322

NVIDIA Triton Inference Server for Windows and Linux has a vulnerability where a double free (a memory error where the same memory location is freed twice) can occur when multiple requests cancel a stream before it gets processed, potentially causing a denial of service (making the service unavailable). The vulnerability is tracked as CVE-2025-23322.

CVE-2025-23321: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause a divide by zero

highvulnerability
security
Aug 6, 2025
CVE-2025-23321

NVIDIA Triton Inference Server (software that runs AI models on Windows and Linux computers) contains a vulnerability where a user can send a specially crafted invalid request that causes a divide by zero error (attempting to divide a number by zero, which crashes the system). This could allow an attacker to cause a denial of service attack (making the service unavailable to legitimate users).

CVE-2025-23320: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker c

highvulnerability
security
Aug 6, 2025
CVE-2025-23320

NVIDIA Triton Inference Server for Windows and Linux has a vulnerability in its Python backend where an attacker can send an extremely large request to exceed the shared memory limit (a pool of fast memory shared between processes), potentially exposing sensitive information. The vulnerability has a CVSS 4.0 severity rating, which measures how serious security flaws are on a scale of 0-10.

CVE-2025-23319: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker c

highvulnerability
security
Aug 6, 2025
CVE-2025-23319

NVIDIA Triton Inference Server for Windows and Linux has a vulnerability in its Python backend where an attacker can send a specially crafted request to cause an out-of-bounds write (writing data outside the intended memory location). This could allow remote code execution (running malicious commands on the system), denial of service (making the system unavailable), data tampering (changing data), or information disclosure (exposing sensitive information).

CVE-2025-23318: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker c

highvulnerability
security
Aug 6, 2025
CVE-2025-23318

CVE-2025-23318 is a vulnerability in NVIDIA Triton Inference Server (a tool that runs AI models for predictions) on Windows and Linux where an attacker could cause an out-of-bounds write (writing data outside the intended memory location) in the Python backend component. If successfully exploited, this could allow an attacker to execute code, crash the system, change data, or steal information.

CVE-2025-23317: NVIDIA Triton Inference Server contains a vulnerability in the HTTP server, where an attacker could start a reverse shel

criticalvulnerability
security
Aug 6, 2025
CVE-2025-23317

NVIDIA Triton Inference Server has a vulnerability in its HTTP server (CVE-2025-23317) where an attacker could send a specially crafted HTTP request to start a reverse shell (a remote connection giving the attacker control of the system). This could allow remote code execution (running commands on a system without permission), denial of service (making the system unavailable), data tampering, or information disclosure.

CVE-2025-23311: NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a stack overflow through specially

criticalvulnerability
security
Aug 6, 2025
CVE-2025-23311

NVIDIA Triton Inference Server has a vulnerability (CVE-2025-23311) where an attacker can send specially crafted HTTP requests to cause a stack overflow (a memory error where too much data is written to a limited storage area). This could allow remote code execution (running malicious commands on the server), denial of service (making the server unavailable), information disclosure (leaking data), or data tampering (modifying stored information).

CVE-2025-23310: NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause stack buffer

criticalvulnerability
security
Aug 6, 2025
CVE-2025-23310

NVIDIA Triton Inference Server (software that runs AI models for prediction tasks) for Windows and Linux has a vulnerability where attackers can send specially crafted inputs to cause a stack buffer overflow (writing data beyond allocated memory limits), potentially leading to remote code execution (running commands on the affected system), denial of service (making the system unavailable), information disclosure, and data tampering. The vulnerability has a CVSS score (severity rating) of 4.0.

CVE-2025-5197: A Regular Expression Denial of Service (ReDoS) vulnerability exists in the Hugging Face Transformers library, specifical

highvulnerability
security
Aug 6, 2025
CVE-2025-5197

A ReDoS vulnerability (regular expression denial of service, where a specially crafted input causes a regex pattern to consume excessive CPU) exists in Hugging Face Transformers library version 4.51.3 and earlier, in a function that converts TensorFlow model weight names to PyTorch format. An attacker can exploit this with malicious input strings to crash services or exhaust system resources.

CVE-2025-54868: LibreChat is a ChatGPT clone with additional features. In versions 0.0.6 through 0.7.7-rc1, an exposed testing endpoint

highvulnerability
security
Aug 5, 2025
CVE-2025-54868

LibreChat (a ChatGPT-like application) versions 0.0.6 through 0.7.7-rc1 have a vulnerability where an exposed testing endpoint called /api/search/test allows anyone to read chat messages from any user by directly accessing the Meilisearch engine (a search database) without proper permission checks. This is a serious security flaw because it exposes private conversations.

CVE-2025-54795: Claude Code is an agentic coding tool. In versions below 1.0.20, an error in command parsing makes it possible to bypass

criticalvulnerability
security
Aug 4, 2025
CVE-2025-54795

Claude Code is an agentic coding tool (software that can automatically write and execute code). In versions before 1.0.20, a flaw in how the tool parses commands allows attackers to skip the confirmation prompt that normally protects users before running untrusted code. Exploiting this requires the attacker to insert malicious content into Claude Code's input.

CVE-2025-54794: Claude Code is an agentic coding tool. In versions below 0.2.111, a path validation flaw using prefix matching instead o

criticalvulnerability
security
Aug 4, 2025
CVE-2025-54794

Claude Code, an agentic coding tool (software that can write and modify code automatically), has a path validation flaw in versions before 0.2.111 that allows attackers to bypass directory restrictions and access files outside the intended working directory. The vulnerability exploits prefix matching (checking if one string starts with another) instead of properly comparing full file paths, and requires the attacker to create a directory with the same prefix name and inject untrusted content into the tool's context.

CVE-2025-54135: Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in

highvulnerability
security
Aug 4, 2025
CVE-2025-54135

Cursor, a code editor designed for AI-assisted programming, has a vulnerability in versions below 1.3.9 where it can write files in a workspace without asking the user for permission. An attacker can exploit this by using prompt injection (tricking the AI by hiding instructions in its input) to create sensitive configuration files like .cursor/mcp.json, potentially gaining RCE (remote code execution, where an attacker can run commands on a system they don't own) on the victim's computer without approval.

Previous26 / 73Next
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database

Fix: Update to version 4.53.0 or later, which fixes the vulnerability.

NVD/CVE Database

Fix: This issue is fixed in version 0.7.7. Users should upgrade to version 0.7.7 or later.

NVD/CVE Database

Fix: This is fixed in version 1.0.20. Users should update Claude Code to version 1.0.20 or later.

NVD/CVE Database

Fix: Update Claude Code to version 0.2.111 or later, as this version contains the fix for the path validation flaw.

NVD/CVE Database

Fix: Update Cursor to version 1.3.9 or later, where this vulnerability is fixed.

NVD/CVE Database