Attack Type

Data Leakage

Data leakage in AI systems happens at three layers. At training time, models can memorise rare strings from their corpus — phone numbers, passwords, API keys committed to public code — and an attacker who knows the right context can prompt the model to regurgitate them. At inference time, applications often pass sensitive context to third-party APIs (OpenAI, Anthropic, Bedrock) without redaction; this content is then potentially logged, retained, or used to improve future models depending on the vendor's terms. At the application layer, multi-tenant deployments routinely leak across users when caching, logging, or vector-store indexing is misconfigured. Indirect prompt injection compounds all three by giving an attacker a way to ask the model to repeat what it should not. Defenses: PII redaction in prompts and outputs, differential privacy in training, vendor data-use review, and strict tenant boundaries in shared infrastructure.

175
Total CVEs
9
Pages
Page 1 of 9
Current
Severity CVE CVSS
HIGH CVE-2026-25750 8.1
MEDIUM CVE-2026-2589 5.3
UNKNOWN CVE-2026-25083 -
CRITICAL CVE-2026-25960 9.8
CRITICAL CVE-2020-15205 9.8
MEDIUM CVE-2020-26266 5.3
HIGH CVE-2021-37641 7.1
HIGH CVE-2021-37679 7.8
HIGH CVE-2021-41205 7.1
HIGH CVE-2021-41223 7.1
HIGH CVE-2022-21728 8.1
MEDIUM CVE-2022-23563 6.3
HIGH CVE-2022-23573 8.8
MEDIUM CVE-2024-6577 6.3
MEDIUM CVE-2025-46149 5.3
HIGH CVE-2024-28088 8.1
CRITICAL CVE-2024-7774 9.1
MEDIUM CVE-2024-10940 5.3
MEDIUM CVE-2025-6854 4.3
HIGH CVE-2025-6984 7.5

Page 1 of 9