Attack Type

Data Extraction

Data extraction attacks target the information processed or memorised by AI/ML systems. They take three main forms. First, training-data extraction: large language models can memorise verbatim spans of their training corpus, and an attacker who crafts the right prompts can pull back PII, API keys, or copyrighted text — a result demonstrated against GPT-2 by Carlini et al. and reproduced against several production models. Second, model extraction: by repeatedly querying a hosted model and observing outputs, an attacker can reconstruct enough behaviour to clone proprietary fine-tunes. Third, system-prompt and conversation leakage: indirect prompt injection or insecure logging can leak the application's instructions and other users' conversations. Multi-tenant inference platforms (vLLM, Triton, hosted APIs) and RAG systems are particularly exposed. Defenses: output filtering, differential privacy in training, rate limits, and strict tenant isolation.

611
Total CVEs
31
Pages
Page 2 of 31
Current
Severity CVE CVSS
LOW CVE-2020-26271 3.3
HIGH CVE-2020-26267 7.8
HIGH CVE-2021-29532 7.1
HIGH CVE-2021-29553 7.1
HIGH CVE-2021-29559 7.1
HIGH CVE-2021-29560 7.1
HIGH CVE-2021-29569 7.1
HIGH CVE-2021-29570 7.1
HIGH CVE-2021-29582 7.1
HIGH CVE-2021-29590 7.1
HIGH CVE-2021-29606 7.8
HIGH CVE-2021-29610 7.8
HIGH CVE-2021-29613 7.1
HIGH CVE-2021-37639 7.8
HIGH CVE-2021-37635 7.1
HIGH CVE-2021-37654 7.1
HIGH CVE-2021-37655 7.3
HIGH CVE-2021-37664 7.1
MEDIUM CVE-2021-37670 5.5
MEDIUM CVE-2021-37672 5.5

Page 2 of 31