AI Security Threat Feed
Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.
AI/ML CVEs Tracked
Critical
New This Week
In CISA KEV
Latest AI Security Threats
Showing 20 of 1604 resultskeras: Deserialization enables RCE
CVE-2025-49655 llama-index: world-writable NLTK dir allows local tampering
CVE-2025-7707 scio/PyTorch: torch.load weights_only bypass RCE
GHSA-m9mp-6x32-5rhg Flowise: path traversal in file tools leads to RCE
CVE-2025-61913 vllm: DoS via Jinja template injection in chat API
CVE-2025-61620 vLLM: SSRF in media loader exposes internal network
CVE-2025-6242 LLaMA-Factory: SSRF+LFI in multimodal chat API
CVE-2025-61784 vLLM: timing attack enables API key bypass
CVE-2025-59425 langchain-text-splitters: XXE enables arbitrary file read
CVE-2025-6985 Flowise: unrestricted file upload enables persistent RCE
CVE-2025-61687 clearml: path traversal in safe_extract → RCE risk
CVE-2025-8917 llama-index-core: insecure /tmp dir, model theft risk
CVE-2025-7647 JupyterLab: missing noopener enables reverse tabnabbing
CVE-2025-59842 PyTorch: DoS via sparse/dense tensor Inductor compile
CVE-2025-55560 TensorFlow: DoS via Conv2D valid padding crash
CVE-2025-55559 PyTorch: Inductor compiler buffer overflow causes DoS
CVE-2025-55558 PyTorch: DoS via cummin+Inductor NameError in 2.7.0
CVE-2025-55557 TensorFlow: non-deterministic compilation breaks Embedding
CVE-2025-55556 PyTorch: integer overflow in nan_to_num causes DoS
CVE-2025-55554 PyTorch 2.7.0: DoS via proxy_tensor.py syntax error
CVE-2025-55553 Need deeper analysis?
Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.
Start 14-Day Free Trial
AI Threat Alert