Attack Type

Data Extraction

Data extraction attacks target the information processed or memorised by AI/ML systems. They take three main forms. First, training-data extraction: large language models can memorise verbatim spans of their training corpus, and an attacker who crafts the right prompts can pull back PII, API keys, or copyrighted text — a result demonstrated against GPT-2 by Carlini et al. and reproduced against several production models. Second, model extraction: by repeatedly querying a hosted model and observing outputs, an attacker can reconstruct enough behaviour to clone proprietary fine-tunes. Third, system-prompt and conversation leakage: indirect prompt injection or insecure logging can leak the application's instructions and other users' conversations. Multi-tenant inference platforms (vLLM, Triton, hosted APIs) and RAG systems are particularly exposed. Defenses: output filtering, differential privacy in training, rate limits, and strict tenant isolation.

611
Total CVEs
31
Pages
Page 1 of 31
Current
Severity CVE CVSS
HIGH CVE-2026-27795 7.4
MEDIUM CVE-2026-2589 5.3
CRITICAL CVE-2026-28451 9.3
HIGH CVE-2026-0847 8.6
HIGH CVE-2026-2033 8.1
CRITICAL CVE-2026-25960 9.8
HIGH CVE-2026-28414 7.5
MEDIUM CVE-2026-28415 4.7
HIGH CVE-2026-28416 8.6
HIGH CVE-2026-30820 8.8
UNKNOWN CVE-2026-30822 -
UNKNOWN CVE-2026-30823 -
HIGH CVE-2026-31829 8.8
MEDIUM CVE-2026-27578 5.4
UNKNOWN CVE-2018-7577 -
MEDIUM CVE-2018-21233 6.5
CRITICAL CVE-2020-15196 9.9
MEDIUM CVE-2020-15201 4.8
CRITICAL CVE-2020-15208 9.8
MEDIUM CVE-2020-15211 4.8

Page 1 of 31