AI Security Threat Feed

Latest CVEs affecting AI/ML systems, updated continuously. Tracked from NVD, GitHub Advisory, and CISA KEV.

1,604

AI/ML CVEs Tracked

225

Critical

76

New This Week

16

In CISA KEV

Latest AI Security Threats

Showing 20 of 167 results — Critical severity, no patch
CRITICAL EXPLOIT AVAIL

streamlit-geospatial: eval() injection allows RCE

CVE-2024-41117
9.8
EPSS 2.3%
Code Execution Framework
streamlit-geospatial 2.8K 4 ATLAS
CRITICAL EXPLOIT AVAIL

streamlit-geospatial: RCE via eval() injection

CVE-2024-41116
9.8
EPSS 2.0%
Code Execution Framework
streamlit-geospatial 2.8K 4 ATLAS
CRITICAL EXPLOIT AVAIL

streamlit-geospatial: eval() injection enables RCE

CVE-2024-41115
9.8
EPSS 1.1%
Code Execution Data Extraction Framework
streamlit-geospatial 2.8K 5 ATLAS
CRITICAL EXPLOIT AVAIL

streamlit-geospatial: RCE via eval() on palette input

CVE-2024-41114
9.8
EPSS 1.3%
Code Execution Data Extraction Framework Inference
streamlit-geospatial 2.8K 4 ATLAS
CRITICAL EXPLOIT AVAIL

streamlit-geospatial: RCE via eval() in Timelapse page

CVE-2024-41113
9.8
EPSS 1.6%
Code Execution Data Extraction Framework
streamlit-geospatial 2.8K 5 ATLAS
CRITICAL EXPLOIT AVAIL

streamlit-geospatial: RCE via eval() on palette input

CVE-2024-41112
9.8
EPSS 1.6%
Code Execution Framework
streamlit-geospatial 2.8K 4 ATLAS
CRITICAL EXPLOIT AVAIL

TorchServe: URL bypass enables arbitrary model loading

CVE-2024-35198
9.8
EPSS 0.2%
Auth Bypass Supply Chain Code Execution Inference Framework
torchserve 21.9K 5 ATLAS
CRITICAL EXPLOIT AVAIL

Gradio: code injection via component metadata (CVSS 9.8)

CVE-2024-39236
9.8
EPSS 1.9%
Code Execution Supply Chain Framework Inference
gradio 679 4 ATLAS
CRITICAL EXPLOIT AVAIL

Langflow: unauthenticated RCE via custom component API

CVE-2024-37014
9.8
EPSS 6.5%
Code Execution Auth Bypass Supply Chain Framework Agent API
langflow CWE-94 5 ATLAS
CRITICAL EXPLOIT AVAIL SCANNER

ChuanhuChatGPT: path traversal exposes LLM API keys

CVE-2024-3234
9.8
EPSS 84.0%
Data Extraction Auth Bypass Data Leakage Framework API
chuanhuchatgpt 5 ATLAS
CRITICAL EXPLOIT AVAIL

pytorch-lightning: RCE via deepdiff Delta deserialization

CVE-2024-5452
9.8
EPSS 62.6%
Code Execution Supply Chain Framework
pytorch_lightning CWE-913 21.9K 5 ATLAS
CRITICAL EXPLOIT AVAIL

Gradio: CI/CD command injection enables secrets exfiltration

CVE-2024-4253
9.1
EPSS 1.9%
Supply Chain Code Execution Data Extraction Framework Inference API
gradio 679 5 ATLAS
CRITICAL EXPLOIT AVAIL

llama-cpp-python: SSTI in .gguf loader enables RCE

CVE-2024-34359
9.6
EPSS 39.4%
Code Execution Supply Chain Framework Model Inference
5 ATLAS
CRITICAL EXPLOIT AVAIL

Keras: RCE via malicious model deserialization

CVE-2024-3660
9.8
EPSS 0.4%
Code Execution Supply Chain Framework Model
keras CWE-94 1.5K 5 ATLAS
CRITICAL EXPLOIT AVAIL

MLflow: LFI via URI parsing allows arbitrary file read

CVE-2024-3573
9.3
EPSS 0.2%
Data Extraction Auth Bypass Framework
mlflow CWE-22 624 5 ATLAS
CRITICAL EXPLOIT AVAIL

BentoML: RCE via insecure deserialization (CVSS 10)

CVE-2024-2912
10.0
EPSS 7.5%
Code Execution Supply Chain Framework Inference
5 ATLAS
CRITICAL EXPLOIT AVAIL

HuggingFace Transformers: RCE via pickle deserialization

CVE-2024-3568
9.6
EPSS 24.4%
Code Execution Supply Chain Framework Model
transformers 7.9K 5 ATLAS
CRITICAL EXPLOIT AVAIL

gpt_academic: deserialization RCE, no auth required

CVE-2024-31224
9.8
EPSS 3.3%
Code Execution Data Extraction Framework API
gpt_academic 5 ATLAS
CRITICAL EXPLOIT AVAIL

LangChain TFIDFRetriever: SSRF/RCE via load_local

CVE-2024-2057
9.8
EPSS 0.1%
Code Execution Data Extraction Framework RAG
langchain 2.6K 5 ATLAS
CRITICAL EXPLOIT AVAIL

LangChain Experimental: RCE via Python sandbox escape

CVE-2024-27444
9.8
EPSS 0.1%
Code Execution Supply Chain Framework Agent
langchain-experimental 2.6K 4 ATLAS

Need deeper analysis?

Get ATLAS technique mappings, compliance reports (ISO 42001, EU AI Act), breaking alerts, and full CISO analysis with a Pro subscription.

Start 14-Day Free Trial