aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDatasetFor devs
Subscribe
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

Statistics

Threat intelligence overview across all tracked AI security items.

3,601

Total Items

11

Actively Exploited

0

Unpatched Critical/High

154

Last 7 Days

Top 10 CVEs by Exploit Probability (EPSS)

CVETitleEPSS Severity Exploit Patched
CVE-2024-37032CVE-2024-37032: Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path,93.8%high—
CVE-2024-1561CVE-2024-1561: An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of93.6%high—
CVE-2023-1177CVE-2023-1177: Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1. 93.3%critical—
CVE-2023-51409CVE-2023-51409: Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine: ChatGPT Chatbot.This issue affect92.8%critical—
CVE-2023-49785CVE-2023-49785: NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 92.6%critical—
CVE-2023-3765CVE-2023-3765: Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0.92.1%critical—
CVE-2025-3248CVE-2025-3248: Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and 92.1%critical🔥 Actively Exploited—
CVE-2023-43654CVE-2023-43654: TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper91.6%critical—
CVE-2024-2928CVE-2024-2928: A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fix91.6%high—
CVE-2023-6018CVE-2023-6018: An attacker can overwrite any file on the server hosting MLflow without any authentication.91.3%critical—
CVE-2024-3703293.8%

CVE-2024-37032: Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path,

high
CVE-2024-156193.6%

CVE-2024-1561: An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of

high
CVE-2023-117793.3%

CVE-2023-1177: Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.

critical
CVE-2023-5140992.8%

CVE-2023-51409: Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine: ChatGPT Chatbot.This issue affect

critical
CVE-2023-4978592.6%

CVE-2023-49785: NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2

critical
CVE-2023-376592.1%

CVE-2023-3765: Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0.

critical
CVE-2025-324892.1%

CVE-2025-3248: Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and

critical🔥 Actively Exploited
CVE-2023-4365491.6%

CVE-2023-43654: TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper

critical
CVE-2024-292891.6%

CVE-2024-2928: A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fix

high
CVE-2023-601891.3%

CVE-2023-6018: An attacker can overwrite any file on the server hosting MLflow without any authentication.

critical

This Week vs Last Week

Total Items

46vs 169
-73%(day 2 of 7)

Critical + High

9vs 32
-72%(day 2 of 7)

Vulnerabilities

13vs 41
-68%(day 2 of 7)

Research

0vs 5
-100%(day 2 of 7)
Attack Type This WeekLast WeekChange
Other814-43%
Supply Chain520-75%
Data Extraction38-62%
PII Leakage20+100%
Prompt Injection211-82%

Classification Analytics

LLM-classified attributes across all item types.

Attack Sophistication

Moderate2,557
Trivial844
Advanced199
Nation-State1

AI Component Targeted

Framework755
API664
Agent539
Model409
Inference319
Training Data98
RAG39
Plugin38

Exploit Maturity

1,598

No Known Exploit

11

Actively Exploited

LLM-Specific vs General AI

1,488

LLM-Specific

2,113

General AI/ML

Vendor Vulnerability Breakdown

Vulnerabilities and incidents only (excludes news and research).

VendorTotalCriticalHighMediumLow
LangChain271771127111
HuggingFace1663678492
NVIDIA761036255
OpenAI64221353
Anthropic541425131
Microsoft461320130
Google45723122
LlamaIndex133811
Amazon82510
Apple62310
Meta50320
Stability AI40310
xAI20000

Coverage Summary

By Type

Regulatory77Vulnerabilities1,718Incidents11Research248News1,547

By Severity

medium712info1,588none1high849critical285low166

Monthly Trend

All item types combined.

MonthTotal ItemsCritical + High
2025-062810
2025-074522
2025-088460
2025-096736
2025-107429
2025-115023
2025-128427
2026-017841
2026-0246893
2026-03761162
2026-04770211
2026-057512