AI Component

Model

The model itself is an attack surface separate from the code that runs it. The model file is the first concern: pickle-based formats (PyTorch .bin, joblib, older HuggingFace) execute arbitrary code on load, so loading an untrusted model is loading untrusted code; safetensors solves this but adoption is incomplete. The model's behaviour is the second concern: adversarial examples bypass classifiers used as security controls, backdoor patterns planted during training survive deployment unless explicitly tested for, and model-extraction queries can clone proprietary fine-tunes. Production model registries (HuggingFace Hub, Ollama Library) have hosted backdoored variants of popular base models; HuggingFace now scans uploads for known-bad patterns, but defenses lag attacks. We track CVEs against model formats, model-loader libraries, and published research demonstrating new model-level attack classes against shipped commercial models.

255
Total CVEs
13
Pages
Page 1 of 13
Current
Severity CVE CVSS
HIGH CVE-2026-4538 7.8
HIGH CVE-2026-2033 8.1
CRITICAL CVE-2026-2635 9.8
HIGH CVE-2025-14287 7.5
CRITICAL CVE-2025-15031 9.1
HIGH CVE-2026-28414 7.5
HIGH CVE-2026-28416 8.6
HIGH CVE-2026-27905 7.8
HIGH CVE-2018-8825 8.8
UNKNOWN CVE-2018-7575 -
HIGH CVE-2020-15206 7.5
MEDIUM CVE-2020-15209 5.9
MEDIUM CVE-2020-15210 6.5
MEDIUM CVE-2020-15211 4.8
HIGH CVE-2020-15212 8.6
MEDIUM CVE-2020-15213 4.0
HIGH CVE-2020-15214 8.1
LOW CVE-2020-26271 3.3
MEDIUM CVE-2020-26266 5.3
MEDIUM CVE-2020-26268 4.4

Page 1 of 13