aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

Statistics

Threat intelligence overview across all tracked AI security items.

2,479

Total Items

8

Actively Exploited

0

Unpatched Critical/High

156

Last 7 Days

Top 10 CVEs by Exploit Probability (EPSS)

CVETitleEPSS Severity Exploit Patched
CVE-2024-37032CVE-2024-37032: Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path,93.8%high—
CVE-2024-1561CVE-2024-1561: An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of93.6%high—
CVE-2023-1177CVE-2023-1177: Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1. 93.3%critical—
CVE-2023-51409CVE-2023-51409: Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine: ChatGPT Chatbot.This issue affect92.8%critical—
CVE-2023-49785CVE-2023-49785: NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 92.6%critical—
CVE-2023-3765CVE-2023-3765: Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0.92.1%critical—
CVE-2025-3248CVE-2025-3248: Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and 92.1%critical🔥 Actively Exploited—
CVE-2023-43654CVE-2023-43654: TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper91.6%critical—
CVE-2024-2928CVE-2024-2928: A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fix91.6%high—
CVE-2023-6018CVE-2023-6018: An attacker can overwrite any file on the server hosting MLflow without any authentication.91.3%critical—
CVE-2024-3703293.8%

CVE-2024-37032: Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path,

high
CVE-2024-156193.6%

CVE-2024-1561: An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of

high
CVE-2023-117793.3%

CVE-2023-1177: Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.

critical
CVE-2023-5140992.8%

CVE-2023-51409: Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine: ChatGPT Chatbot.This issue affect

critical
CVE-2023-4978592.6%

CVE-2023-49785: NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2

critical
CVE-2023-376592.1%

CVE-2023-3765: Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0.

critical
CVE-2025-324892.1%

CVE-2025-3248: Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and

critical🔥 Actively Exploited
CVE-2023-4365491.6%

CVE-2023-43654: TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper

critical
CVE-2024-292891.6%

CVE-2024-2928: A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fix

high
CVE-2023-601891.3%

CVE-2023-6018: An attacker can overwrite any file on the server hosting MLflow without any authentication.

critical

This Week vs Last Week

Total Items

153vs 155
-1%(day 6 of 7)

Critical + High

33vs 18
+83%(day 6 of 7)

Vulnerabilities

34vs 20
+70%(day 6 of 7)

Research

25vs 2
+1150%(day 6 of 7)
Attack Type This WeekLast WeekChange
Supply Chain1715+13%
Other136+117%
Prompt Injection1213-8%
Data Extraction63+100%
Model Evasion41+300%

Classification Analytics

LLM-classified attributes across all item types.

Attack Sophistication

Moderate1,789
Trivial581
Advanced109

AI Component Targeted

Framework680
API442
Agent338
Model232
Inference222
Training Data72
Plugin31
RAG31

Exploit Maturity

1,343

No Known Exploit

8

Actively Exploited

LLM-Specific vs General AI

913

LLM-Specific

1,566

General AI/ML

Vendor Vulnerability Breakdown

Vulnerabilities and incidents only (excludes news and research).

VendorTotalCriticalHighMediumLow
HuggingFace1463367432
LangChain1455053402
NVIDIA66928245
OpenAI49213293
Microsoft421218120
Google4162392
Anthropic38131771
LlamaIndex113701
Amazon61410
Apple62310
Meta50320
Stability AI40310

Coverage Summary

By Type

Regulatory69Vulnerabilities1,382Incidents5Research160News863

By Severity

medium580info916none1high614critical222low146

Monthly Trend

All item types combined.

MonthTotal ItemsCritical + High
2025-04309
2025-054116
2025-062810
2025-074522
2025-088460
2025-096636
2025-106829
2025-114923
2025-128327
2026-017341
2026-0246893
2026-0349887