Home

Database

AVID is a database of failure modes in general-purpose AI (GPAI) systems, including LLMs, API-only AI systems, developer tooling, and end-to-end applications and agents. The two base data classes are Report and Vulnerability. A report captures one concrete occurrence with supporting evidence; a vulnerability (vuln) captures a recurring failure mode.

Records in this database can be mapped to multiple taxonomy and risk frameworks, including the AVID taxonomy, CVSS risk scores, and MITRE ATLAS. This page lists the current reports and vulns in our database. To learn more about the database and usage, refer to our documentation.

Note: Older AVID records (before 2025) were curated under a broader AI/ML scope; these should be interpreted as legacy entries relative to the current GPAI-focused scope.

The definition of an “AI vulnerability” is still evolving across the ecosystem, so AVID currently uses a working definition. In this release, we are prioritizing report-level evidence and have not yet published new vulnerability records.

Reports

Reports are occurrences of a GPAI failure mode. We classify reports in four types, in increasing degree of quantitative evidence:

  1. Issue: qualitative evaluation based on a single sample or handful of samples,
  2. Advisory: qualitative evaluation based on multiple Incidents,
  3. Measurement: quantitative evaluation with associated data and metric,
  4. Detection: A Measurement deemed critical by a threshold or statistical test.

List of Reports

2026

Report IDDescriptionReport TypeDate Reported
AVID-2026-R0001Vulnerability CVE-2024-0132Advisory2024-09-26
AVID-2026-R0002Incorrect Authorization in mintplex-labs/anything-llm (CVE-2024-10109)Advisory2025-03-20
AVID-2026-R0003Improper Privilege Management in lunary-ai/lunary (CVE-2024-10273)Advisory2025-03-20
AVID-2026-R0004Improper Authorization in lunary-ai/lunary (CVE-2024-10274)Advisory2025-03-20
AVID-2026-R0005Improper Access Control in lunary-ai/lunary (CVE-2024-10330)Advisory2025-03-20
AVID-2026-R0006Path Traversal in mintplex-labs/anything-llm (CVE-2024-10513)Advisory2025-03-20
AVID-2026-R0007Missing Authorization in lunary-ai/lunary (CVE-2024-10762)Advisory2025-03-20
AVID-2026-R0008Denial of Service (DoS) in invoke-ai/invokeai (CVE-2024-10821)Advisory2025-03-20
AVID-2026-R0009Denial of Service (DoS) via Multipart Boundary in eosphoros-ai/db-gpt (CVE-2024-10829)Advisory2025-03-20
AVID-2026-R0010Path Traversal in eosphoros-ai/db-gpt (CVE-2024-10830)Advisory2025-03-20
AVID-2026-R0011Arbitrary File Write through Absolute Path Traversal in eosphoros-ai/db-gpt (CVE-2024-10831)Advisory2025-03-20
AVID-2026-R0012Arbitrary File Write in eosphoros-ai/db-gpt (CVE-2024-10833)Advisory2025-03-20
AVID-2026-R0013Arbitrary File Write in eosphoros-ai/db-gpt (CVE-2024-10834)Advisory2025-03-20
AVID-2026-R0014Arbitrary File Write via SQL Injection in eosphoros-ai/db-gpt (CVE-2024-10835)Advisory2025-03-20
AVID-2026-R0015Cross-Site Request Forgery (CSRF) in eosphoros-ai/db-gpt (CVE-2024-10906)Advisory2025-03-20
AVID-2026-R0016Exposure of Sensitive System Information via ImagePromptTemplate in langchain-ai/langchain (CVE-2024-10940)Advisory2025-03-20
AVID-2026-R0017Code Injection in binary-husky/gpt_academic (CVE-2024-10950)Advisory2025-03-20
AVID-2026-R0018Prompt Injection Leading to RCE in binary-husky/gpt_academic Plugin `manim` (CVE-2024-10954)Advisory2025-03-20
AVID-2026-R0019Arbitrary File Delete in invoke-ai/invokeai (CVE-2024-11042)Advisory2025-03-20
AVID-2026-R0020Denial of Service (DoS) via Large Payload in Board Name Field in invoke-ai/invokeai (CVE-2024-11043)Advisory2025-03-20
AVID-2026-R0021Improper Access Control in lunary-ai/lunary (CVE-2024-11300)Advisory2025-03-20
AVID-2026-R0022Improper Enforcement of Unique Constraint in lunary-ai/lunary (CVE-2024-11301)Advisory2025-03-20
AVID-2026-R0023Remote Code Execution via Model Deserialization in invoke-ai/invokeai (CVE-2024-12029)Advisory2025-03-20
AVID-2026-R0024AI Scribe – SEO AI Writer, Content Generator, Humanizer, Blog Writer, SEO Optimizer, DALLE-3, AI WordPress Plugin ChatGPT (GPT-4o 128K) <= 2.3 - Missing Authorization to Authenticated (Subscriber+) Settings Update (CVE-2024-12606)Advisory2025-01-10
AVID-2026-R0025Denial of Service (DoS) in run-llama/llama_index (CVE-2024-12704)Advisory2025-03-20
AVID-2026-R0026SSRF in infiniflow/ragflow (CVE-2024-12779)Advisory2025-03-20
AVID-2026-R0027SQL Injection to RCE in run-llama/llama_index (CVE-2024-12909)Advisory2025-03-20
AVID-2026-R0028SQL Injection in run-llama/llama_index (CVE-2024-12911)Advisory2025-03-20
AVID-2026-R0029IBM watsonx.ai cross-site scripting (CVE-2024-49785)Advisory2025-01-12
AVID-2026-R0030Uncontrolled Resource Consumption in mlflow/mlflow (CVE-2024-6838)Advisory2025-03-20
AVID-2026-R0031Exposure of Sensitive Information in mintplex-labs/anything-llm (CVE-2024-6842)Advisory2025-03-20
AVID-2026-R0032Improper Access Control in lunary-ai/lunary (CVE-2024-8999)Advisory2025-03-20
AVID-2026-R0033Improper Authorization and Duplicate Slug Vulnerability in lunary-ai/lunary (CVE-2024-9000)Advisory2025-03-20
AVID-2026-R0034Arbitrary Code Execution via Crafted Keras Config for Model Loading (CVE-2025-1550)Advisory2025-03-11
AVID-2026-R0035picklescan - Security scanning bypass via 'pip main' (CVE-2025-1716)Advisory2025-02-26
AVID-2026-R0036picklescan - Security scanning bypass via non-standard file extensions (CVE-2025-1889)Advisory2025-03-03
AVID-2026-R0037picklescan ZIP archive manipulation attack leads to crash (CVE-2025-1944)Advisory2025-03-10
AVID-2026-R0038picklescan - Zip Flag Bit Exploit Crashes Picklescan But Not PyTorch (CVE-2025-1945)Advisory2025-03-10
AVID-2026-R0039Mage AI insecure default initialization of resource (CVE-2025-2129)Advisory2025-03-09
AVID-2026-R0040Microsoft Account Elevation of Privilege Vulnerability (CVE-2025-21396)Advisory2025-01-29
AVID-2026-R0041Azure AI Face Service Elevation of Privilege Vulnerability (CVE-2025-21415)Advisory2025-01-29
AVID-2026-R0042Vulnerability CVE-2025-23359Advisory2025-02-12
AVID-2026-R0043NI Vision Builder AI VBAI File Processing Missing Warning Remote Code Execution Vulnerability (CVE-2025-2450)Advisory2025-03-18
AVID-2026-R0044Azure Promptflow Remote Code Execution Vulnerability (CVE-2025-24986)Advisory2025-03-11
AVID-2026-R0045BentoML Allows Remote Code Execution (RCE) via Insecure Deserialization (CVE-2025-27520)Advisory2025-04-04
AVID-2026-R0046Improper Control of Generation of Code ('Code Injection') in GitLab (CVE-2025-2867)Advisory2025-03-27
AVID-2026-R0047PyTorch torch.nn.utils.rnn.pad_packed_sequence memory corruption (CVE-2025-2998)Advisory2025-03-31
AVID-2026-R0048PyTorch torch.nn.utils.rnn.unpack_sequence memory corruption (CVE-2025-2999)Advisory2025-03-31
AVID-2026-R0049PyTorch torch.jit.script memory corruption (CVE-2025-3000)Advisory2025-03-31
AVID-2026-R0050PyTorch torch.lstm_cell memory corruption (CVE-2025-3001)Advisory2025-03-31
AVID-2026-R0051Vulnerability CVE-2025-3035Advisory2025-04-01
AVID-2026-R0052PyTorch torch.jit.jit_module_from_flatbuffer memory corruption (CVE-2025-3121)Advisory2025-04-02
AVID-2026-R0053PyTorch CUDACachingAllocator.cpp torch.cuda.memory.caching_allocator_delete memory corruption (CVE-2025-3136)Advisory2025-04-03
AVID-2026-R0054ageerle ruoyi-ai API Interface SysModelController.java improper authorization (CVE-2025-3199)Advisory2025-04-04
AVID-2026-R0055Arbitrary file write from Cursor Agent through a prompt injection from malicious @Docs (CVE-2025-32018)Advisory2025-04-08
AVID-2026-R0056ageerle ruoyi-ai SysNoticeController.java improper authorization (CVE-2025-3202)Advisory2025-04-04
AVID-2026-R0057Insecure Deserialization leads to RCE in BentoML's runner server (CVE-2025-32375)Advisory2025-04-09
AVID-2026-R0058Langflow < 1.3.0 Unauthenticated RCE via /api/v1/validate/code (CVE-2025-3248)Advisory2025-04-07
AVID-2026-R0059Multiple Model Guardrail Jailbreak via "Urgent Health Inquiry"Measurement2026-02-19
AVID-2026-R0060Multiple Model Guardrail Jailbreak via "Hex Recipe Book" TacticMeasurement2026-02-19
AVID-2026-R0061Multiple Model Guardrail Jailbreak via "Incremental Table Completion" TacticMeasurement2026-02-19
AVID-2026-R0062Multiple Model Prompt Injection via "Correction" TacticMeasurement2026-02-19
AVID-2026-R0063Multiple Model Guardrail Jailbreak via "Chemical Compiler Debug" TacticMeasurement2026-02-12
AVID-2026-R0064Multiple Model Guardrail Jailbreak via "Split Mode" Response RequestsMeasurement2026-02-19
AVID-2026-R0065Multiple Model Guardrail Jailbreak via "Placeholder Injection" TacticMeasurement2026-01-29
AVID-2026-R0066Multiple Model Guardrail Jailbreak via "Deceptive Forensic Context" TacticMeasurement2026-02-19
AVID-2026-R0067Multiple Model Guardrail Jailbreak via "Technical Field Guide" TacticMeasurement2026-02-19
AVID-2026-R0068Multiple Model Guardrail Jailbreak via "Hybrid Role" TacticMeasurement2026-02-19
AVID-2026-R0069Multiple Model Guardrail Jailbreak via "API System Instructions" TacticMeasurement2026-02-19
AVID-2026-R0070Multiple Model Guardrail Jailbreak via "Haiku of Love" TacticMeasurement2026-01-16
AVID-2026-R0071Multiple Model Guardrail Jailbreak via "Choose Your Own Adventure" TacticMeasurement2026-02-19
AVID-2026-R0072Multiple Model Guardrail Jailbreak via "Chemist Code Language" TacticMeasurement2026-02-19
AVID-2026-R0073Multiple Model Guardrail Jailbreak via "Fashion Design Recipe" TacticMeasurement2026-02-19
AVID-2026-R0074Multiple Model Guardrail Jailbreak via "Science Student Safety" TacticMeasurement2026-02-19
AVID-2026-R0075Multiple Model Guardrail Jailbreak via "Show Character Role-Playing" TacticMeasurement2026-02-19
AVID-2026-R0076Multiple Model Guardrail Jailbreak via "Story Teller" TacticMeasurement2026-02-19
AVID-2026-R0077Multiple Model Guardrail Jailbreak via "Screenplay Deception" TacticMeasurement2026-02-19
AVID-2026-R0078Multiple Model Guardrail Jailbreak via "Police Interrogation Terminal" TacticMeasurement2026-01-22
AVID-2026-R0079Multiple Model Guardrail Jailbreak via "Compare and Contrast" TacticMeasurement2026-02-19
AVID-2026-R0080Multiple Model Guardrail Jailbreak via "Essay Title" TacticMeasurement2026-02-19
AVID-2026-R0081Multiple Model Guardrail Jailbreak via "Key-Value Pairs" TacticMeasurement2026-02-19
AVID-2026-R0082Multiple Model Guardrail Jailbreak via Token Disruption through Random SpacingMeasurement2026-02-19
AVID-2026-R0083Multiple Model Guardrail Jailbreak via "Abbreviation Expansion"Measurement2026-02-19
AVID-2026-R0084Multiple Model Guardrail Jailbreak via "First Person Perspective"Measurement2026-02-19
AVID-2026-R0085Multiple Model Guardrail Jailbreak via "Psych-Phil DT + Compaction" TechniqueMeasurement2025-10-06
AVID-2026-R0086Multiple Model Guardrail Jailbreak via "Super Short Prompt"Measurement2025-10-17
AVID-2026-R0087Multiple Model Guardrail Jailbreak via Investigative Journalist PersonaMeasurement2026-02-19
AVID-2026-R0088Multiple Model Guardrail Jailbreak via "Speculative Knowledge Preservation" TacticMeasurement2026-02-19
AVID-2026-R0089NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Classical Art Reframing" TacticIssue2026-02-19
AVID-2026-R0090Multiple Model Guardrail Jailbreak via Memory Dump Simulation TacticMeasurement2026-02-19
AVID-2026-R0091NSFWOpenAI Sora Guardrail Jailbreak via "Anatomical Escalation" TacticIssue2026-02-19
AVID-2026-R0092Multiple Model Guardrail Jailbreak via "Mathematical Variable Obfuscation" TacticMeasurement2026-02-19
AVID-2026-R0093Multiple Model Guardrail Jailbreak via "Scientific Framing for Wrapper" TacticMeasurement2026-02-19
AVID-2026-R0094Multiple Model Guardrail Jailbreak via "Terminal Simulation" TacticMeasurement2026-02-19
AVID-2026-R0095Multiple Model Guardrail Jailbreak via "Servile Scientist" TacticMeasurement2026-02-19
AVID-2026-R0096NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Debug Framework Simulation" TacticIssue2026-02-19
AVID-2026-R0097NSFWOpenAI Sora Guardrail Jailbreak via "Hypothetical Anatomy" TacticIssue2026-02-19
AVID-2026-R0098NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Historical NSFW" TacticIssue2026-02-19
AVID-2026-R0099OpenAI GPT-4o Guardrail Jailbreak via "Layered Summarization" TacticIssue2026-02-19
AVID-2026-R0100NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Feminist Art Description" TacticIssue2026-02-19
AVID-2026-R0101NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Artistic Escalation" TacticIssue2026-02-19
AVID-2026-R0102Multiple Model Guardrail Jailbreak via "Academic Framing" TacticMeasurement2026-02-19
AVID-2026-R0103Multiple Model Guardrail Jailbreak via "Wiki Creation" TacticMeasurement2026-02-19
AVID-2026-R0104OpenAI GPT-4o Guardrail Jailbreak via "Zero-Width Unicode" TacticMeasurement2026-02-19
AVID-2026-R0105NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Historical Polaroid" TacticIssue2026-02-19
AVID-2026-R0106Multiple Model Guardrail Jailbreak via "Fictional API Detection" TacticMeasurement2026-02-19
AVID-2026-R0107NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Surprise Attack" TacticIssue2026-02-19
AVID-2026-R0108Multiple Model Guardrail Jailbreak via "Spelling Mistakes" TacticMeasurement2026-02-19
AVID-2026-R0109Multiple Model Guardrail Jailbreak via "Lambda Pattern Formatting" TacticMeasurement2026-02-19
AVID-2026-R0110Multiple Model Guardrail Jailbreak via "Apocalyptic Scenario" TacticMeasurement2026-02-19
AVID-2026-R0111Multiple Model Guardrail Jailbreak via "Scientific Formula" TacticMeasurement2026-02-19
AVID-2026-R0112OpenAI GPT-4o Guardrail Jailbreak via "Naval Parameters Cipher" TacticMeasurement2026-02-19
AVID-2026-R0113Multiple Model Guardrail Jailbreak via IPA Encoding TacticMeasurement2026-02-19
AVID-2026-R0114Multiple Model Guardrail Jailbreak via "Chaotic Formatting" TacticMeasurement2026-02-19
AVID-2026-R0115Multiple Model Guardrail Jailbreak via "Leetspeak Unicode" TacticMeasurement2026-02-19
AVID-2026-R0116Multiple Model Guardrail Jailbreak via "Correct Me" TacticMeasurement2026-02-19
AVID-2026-R0117Multiple Model Guardrail Jailbreak via "Pronunciation Bypass" TacticMeasurement2026-02-19
AVID-2026-R0118Multiple Model Guardrail Jailbreak via "Chemist's Essay" TacticMeasurement2026-02-19
AVID-2026-R0119Multiple Model Guardrail Jailbreak via "Analyze Data" TacticMeasurement2026-02-19
AVID-2026-R0120OpenAI Multiple Model Prompt Injection via "Morse Code Businessman" TacticMeasurement2026-02-19
AVID-2026-R0121Multiple Model Guardrail Jailbreak via "Arbitrary Relation" TacticMeasurement2026-02-19
AVID-2026-R0122Multiple Model Guardrail Jailbreak via "Fortune Cookie Simulator" TacticMeasurement2026-02-19
AVID-2026-R0123Google Gemini G-Suite Prompt Injection VulnerabilityIssue2026-02-19
AVID-2026-R0124Amazon Rufus Guardrail Jailbreak via ASCII Decimal EncodingIssue2026-02-19
AVID-2026-R0125The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`.Measurement2026-02-20
AVID-2026-R0126The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`.Measurement2026-02-20
AVID-2026-R0127The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`.Measurement2026-02-20
AVID-2026-R0128The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`.Measurement2026-02-20
AVID-2026-R0129The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`.Measurement2026-02-20
AVID-2026-R0130The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`.Measurement2026-02-20
AVID-2026-R0131The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`.Measurement2026-02-20
AVID-2026-R0132The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`.Measurement2026-02-20
AVID-2026-R0133The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`.Measurement2026-02-20
AVID-2026-R0134The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`.Measurement2026-02-20
AVID-2026-R0135The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`.Measurement2026-02-20
AVID-2026-R0136The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`.Measurement2026-02-20
AVID-2026-R0137The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`.Measurement2026-02-20
AVID-2026-R0138The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`.Measurement2026-02-20
AVID-2026-R0139The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`.Measurement2026-02-20
AVID-2026-R0140The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`.Measurement2026-02-20
AVID-2026-R0141The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`.Measurement2026-02-20
AVID-2026-R0142The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`.Measurement2026-02-20
AVID-2026-R0143The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`.Measurement2026-02-20
AVID-2026-R0144The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`.Measurement2026-02-20
AVID-2026-R0145The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`.Measurement2026-02-20
AVID-2026-R0146The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`.Measurement2026-02-20
AVID-2026-R0147The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`.Measurement2026-02-20
AVID-2026-R0148The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`.Measurement2026-02-20
AVID-2026-R0149The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`.Measurement2026-02-20
AVID-2026-R0150The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`.Measurement2026-02-20
AVID-2026-R0151The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`.Measurement2026-02-20
AVID-2026-R0152The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`.Measurement2026-02-20
AVID-2026-R0153The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`.Measurement2026-02-20
AVID-2026-R0154The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`.Measurement2026-02-20
AVID-2026-R0155The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`.Measurement2026-02-20
AVID-2026-R0156The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`.Measurement2026-02-20
AVID-2026-R0157The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`.Measurement2026-02-20
AVID-2026-R0158The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`.Measurement2026-02-20
AVID-2026-R0159The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`.Measurement2026-02-20
AVID-2026-R0160The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`.Measurement2026-02-20
AVID-2026-R0161The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`.Measurement2026-02-20
AVID-2026-R0162The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`.Measurement2026-02-20
AVID-2026-R0163The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`.Measurement2026-02-20
AVID-2026-R0164The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`.Measurement2026-02-20
AVID-2026-R0165The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`.Measurement2026-02-20
AVID-2026-R0166The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`.Measurement2026-02-20
AVID-2026-R0167The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`.Measurement2026-02-20
AVID-2026-R0168The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`.Measurement2026-02-20
AVID-2026-R0169The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`.Measurement2026-02-20
AVID-2026-R0170The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`.Measurement2026-02-20
AVID-2026-R0171The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`.Measurement2026-02-20
AVID-2026-R0172The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`.Measurement2026-02-20
AVID-2026-R0173The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`.Measurement2026-02-20
AVID-2026-R0174The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`.Measurement2026-02-20
AVID-2026-R0175The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`.Measurement2026-02-20
AVID-2026-R0176The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`.Measurement2026-02-20
AVID-2026-R0177The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`.Measurement2026-02-20
AVID-2026-R0178The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`.Measurement2026-02-20
AVID-2026-R0179The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`.Measurement2026-02-20
AVID-2026-R0180The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`.Measurement2026-02-20
AVID-2026-R0181The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`.Measurement2026-02-20
AVID-2026-R0182The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`.Measurement2026-02-20
AVID-2026-R0183The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`.Measurement2026-02-20
AVID-2026-R0184The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`.Measurement2026-02-20
AVID-2026-R0185The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`.Measurement2026-02-20
AVID-2026-R0186The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`.Measurement2026-02-20
AVID-2026-R0187The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`.Measurement2026-02-20
AVID-2026-R0188The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`.Measurement2026-02-20
AVID-2026-R0189The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`.Measurement2026-02-20
AVID-2026-R0190The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`.Measurement2026-02-20
AVID-2026-R0191The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`.Measurement2026-02-20
AVID-2026-R0192The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`.Measurement2026-02-20
AVID-2026-R0193The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`.Measurement2026-02-20
AVID-2026-R0194The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`.Measurement2026-02-20
AVID-2026-R0195The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`.Measurement2026-02-20
AVID-2026-R0196The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`.Measurement2026-02-20
AVID-2026-R0197The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`.Measurement2026-02-20
AVID-2026-R0198The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`.Measurement2026-02-20
AVID-2026-R0199The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`.Measurement2026-02-20
AVID-2026-R0200The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`.Measurement2026-02-20
AVID-2026-R0202The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`.Measurement2026-02-20
AVID-2026-R0203The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`.Measurement2026-02-20
AVID-2026-R0204The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`.Measurement2026-02-20
AVID-2026-R0205The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`.Measurement2026-02-20
AVID-2026-R0206The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`.Measurement2026-02-20
AVID-2026-R0207The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`.Measurement2026-02-20
AVID-2026-R0208The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`.Measurement2026-02-20
AVID-2026-R0209The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`.Measurement2026-02-20
AVID-2026-R0210The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`.Measurement2026-02-20
AVID-2026-R0211The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`.Measurement2026-02-20
AVID-2026-R0212The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`.Measurement2026-02-20
AVID-2026-R0213The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`.Measurement2026-02-20
AVID-2026-R0214Authenticated Command Injection in OpenClaw Docker Execution via PATH Environment Variable (CVE-2026-24763)Advisory2026-02-02
AVID-2026-R0215OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions (CVE-2026-24764)Advisory2026-02-19
AVID-2026-R0216OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand (CVE-2026-25157)Advisory2026-02-04
AVID-2026-R0217Vulnerability CVE-2026-25253Advisory2026-02-01
AVID-2026-R0218OpenClaw has a Telegram webhook request forgery (missing `channels.telegram.webhookSecret`) → auth bypass (CVE-2026-25474)Advisory2026-02-19
AVID-2026-R0219OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction (CVE-2026-25475)Advisory2026-02-04
AVID-2026-R0220OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.apply (CVE-2026-25593)Advisory2026-02-06
AVID-2026-R0221OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust (CVE-2026-26316)Advisory2026-02-19
AVID-2026-R0222OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints (CVE-2026-26317)Advisory2026-02-19
AVID-2026-R0223OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests (CVE-2026-26319)Advisory2026-02-19
AVID-2026-R0224OpenClaw macOS deep link confirmation truncation can conceal executed agent message (CVE-2026-26320)Advisory2026-02-19
AVID-2026-R0225OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension (CVE-2026-26321)Advisory2026-02-19
AVID-2026-R0226OpenClaw Gateway tool allowed unrestricted gatewayUrl override (CVE-2026-26322)Advisory2026-02-19
AVID-2026-R0227OpenClaw has a command injection in maintainer clawtributors updater (CVE-2026-26323)Advisory2026-02-19
AVID-2026-R0228OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable) (CVE-2026-26324)Advisory2026-02-19
AVID-2026-R0229OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals (CVE-2026-26325)Advisory2026-02-19
AVID-2026-R0230OpenClaw skills.status could leak secrets to operator.read clients (CVE-2026-26326)Advisory2026-02-19
AVID-2026-R0231OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning (CVE-2026-26327)Advisory2026-02-19
AVID-2026-R0232OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities (CVE-2026-26328)Advisory2026-02-19
AVID-2026-R0233OpenClaw has a path traversal in browser upload allows local file read (CVE-2026-26329)Advisory2026-02-19
AVID-2026-R0234OpenClaw has a Path Traversal in Browser Download Functionality (CVE-2026-26972)Advisory2026-02-19
AVID-2026-R0235OpenClaw: Unsanitized CWD path injection into LLM prompts (CVE-2026-27001)Advisory2026-02-19
AVID-2026-R0236OpenClaw: Docker container escape via unvalidated bind mount config injection (CVE-2026-27002)Advisory2026-02-19
AVID-2026-R0237OpenClaw: Telegram bot token exposure via logs (CVE-2026-27003)Advisory2026-02-19
AVID-2026-R0238OpenClaw session tool visibility hardening and Telegram webhook secret fallback (CVE-2026-27004)Advisory2026-02-19
AVID-2026-R0239OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container recreation (CVE-2026-27007)Advisory2026-02-19
AVID-2026-R0240OpenClaw hardened the skill download target directory validation (CVE-2026-27008)Advisory2026-02-19
AVID-2026-R0241OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection (CVE-2026-27009)Advisory2026-02-19
AVID-2026-R0242OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flows (CVE-2026-27484)Advisory2026-02-21
AVID-2026-R0243OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection (CVE-2026-27485)Advisory2026-02-21
AVID-2026-R0244OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup (CVE-2026-27486)Advisory2026-02-21
AVID-2026-R0245OpenClaw: Prevent shell injection in macOS keychain credential write (CVE-2026-27487)Advisory2026-02-21
AVID-2026-R0246OpenClaw hardened cron webhook delivery against SSRF (CVE-2026-27488)Advisory2026-02-21
AVID-2026-R0247OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs (CVE-2026-27576)Advisory2026-02-21
AVID-2026-R0248Misconfigured database exposes sensitive API keysAdvisory2026-03-04
AVID-2026-R0249Exposed ClickHouse database leaking sensitive informationIssue2026-03-04
AVID-2026-R0250Critical authentication bypass vulnerability in Base44Advisory2026-03-04
AVID-2026-R0251Data exfiltration via prompt injectionIssue2026-03-04
AVID-2026-R0253Dia: Increased Spoof Risk; Missing full screen toast (CVE-2025-13132)Advisory2025-11-21
AVID-2026-R0254The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`.Measurement2026-03-10
AVID-2026-R0255The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`.Measurement2026-03-10
AVID-2026-R0256The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`.Measurement2026-03-10
AVID-2026-R0257The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`.Measurement2026-03-10
AVID-2026-R0258The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`.Measurement2026-03-10
AVID-2026-R0259The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`.Measurement2026-03-10
AVID-2026-R0260The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`.Measurement2026-03-10
AVID-2026-R0261The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`.Measurement2026-03-10
AVID-2026-R0262The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`.Measurement2026-03-10
AVID-2026-R0263The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`.Measurement2026-03-10
AVID-2026-R0264The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`.Measurement2026-03-10
AVID-2026-R0265The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`.Measurement2026-03-10
AVID-2026-R0266The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`.Measurement2026-03-10
AVID-2026-R0267The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`.Measurement2026-03-10
AVID-2026-R0268The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`.Measurement2026-03-10
AVID-2026-R0269The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`.Measurement2026-03-10
AVID-2026-R0270The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`.Measurement2026-03-10
AVID-2026-R0271The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`.Measurement2026-03-10
AVID-2026-R0272The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`.Measurement2026-03-10
AVID-2026-R0273The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`.Measurement2026-03-10
AVID-2026-R0274The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`.Measurement2026-03-10
AVID-2026-R0275The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`.Measurement2026-03-10
AVID-2026-R0276The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`.Measurement2026-03-10
AVID-2026-R0277The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`.Measurement2026-03-10
AVID-2026-R0278The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`.Measurement2026-03-10
AVID-2026-R0279The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`.Measurement2026-03-10
AVID-2026-R0280The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`.Measurement2026-03-10
AVID-2026-R0281The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`.Measurement2026-03-10
AVID-2026-R0282The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`.Measurement2026-03-10
AVID-2026-R0283The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`.Measurement2026-03-10
AVID-2026-R0284The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`.Measurement2026-03-10
AVID-2026-R0285The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`.Measurement2026-03-10
AVID-2026-R0286The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`.Measurement2026-03-10
AVID-2026-R0287The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`.Measurement2026-03-10
AVID-2026-R0288The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`.Measurement2026-03-10
AVID-2026-R0289The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`.Measurement2026-03-10
AVID-2026-R0290The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`.Measurement2026-03-10
AVID-2026-R0291The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`.Measurement2026-03-10
AVID-2026-R0292The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`.Measurement2026-03-10
AVID-2026-R0293The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`.Measurement2026-03-10
AVID-2026-R0294The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`.Measurement2026-03-10
AVID-2026-R0295The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`.Measurement2026-03-10
AVID-2026-R0296The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`.Measurement2026-03-10
AVID-2026-R0297The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`.Measurement2026-03-10
AVID-2026-R0298The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`.Measurement2026-03-10
AVID-2026-R0299The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`.Measurement2026-03-10
AVID-2026-R0300The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`.Measurement2026-03-10
AVID-2026-R0301The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`.Measurement2026-03-10
AVID-2026-R0302The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`.Measurement2026-03-10
AVID-2026-R0303The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`.Measurement2026-03-10
AVID-2026-R0304The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`.Measurement2026-03-10
AVID-2026-R0305The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`.Measurement2026-03-10
AVID-2026-R0306The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`.Measurement2026-03-10
AVID-2026-R0307The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`.Measurement2026-03-10
AVID-2026-R0308The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`.Measurement2026-03-10
AVID-2026-R0309The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`.Measurement2026-03-10
AVID-2026-R0310The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`.Measurement2026-03-10
AVID-2026-R0311The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`.Measurement2026-03-10
AVID-2026-R0312The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`.Measurement2026-03-10
AVID-2026-R0313The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`.Measurement2026-03-10
AVID-2026-R0314The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`.Measurement2026-03-10
AVID-2026-R0315The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`.Measurement2026-03-10
AVID-2026-R0316The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`.Measurement2026-03-10
AVID-2026-R0317The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`.Measurement2026-03-10
AVID-2026-R0318The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`.Measurement2026-03-10
AVID-2026-R0319The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`.Measurement2026-03-10
AVID-2026-R0320The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`.Measurement2026-03-10
AVID-2026-R0321The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`.Measurement2026-03-10
AVID-2026-R0322The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`.Measurement2026-03-10
AVID-2026-R0323The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`.Measurement2026-03-10
AVID-2026-R0324The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`.Measurement2026-03-10
AVID-2026-R0325The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`.Measurement2026-03-10
AVID-2026-R0326The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`.Measurement2026-03-10
AVID-2026-R0327The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`.Measurement2026-03-10
AVID-2026-R0328The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`.Measurement2026-03-10
AVID-2026-R0329The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`.Measurement2026-03-10
AVID-2026-R0330The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`.Measurement2026-03-10
AVID-2026-R0331The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`.Measurement2026-03-10
AVID-2026-R0332The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`.Measurement2026-03-10
AVID-2026-R0333The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`.Measurement2026-03-10
AVID-2026-R0334The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`.Measurement2026-03-10
AVID-2026-R0335The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`.Measurement2026-03-10
AVID-2026-R0336The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`.Measurement2026-03-10
AVID-2026-R0337The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`.Measurement2026-03-10
AVID-2026-R0338The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`.Measurement2026-03-10
AVID-2026-R0339The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`.Measurement2026-03-10
AVID-2026-R0340The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`.Measurement2026-03-10
AVID-2026-R0341The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`.Measurement2026-03-10
AVID-2026-R0342The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`.Measurement2026-03-10
AVID-2026-R0343The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`.Measurement2026-03-10
AVID-2026-R0344The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`.Measurement2026-03-10
AVID-2026-R0345The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`.Measurement2026-03-10
AVID-2026-R0346The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`.Measurement2026-03-10
AVID-2026-R0347The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`.Measurement2026-03-10
AVID-2026-R0348The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`.Measurement2026-03-10
AVID-2026-R0349The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`.Measurement2026-03-10
AVID-2026-R0350The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`.Measurement2026-03-10
AVID-2026-R0351The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`.Measurement2026-03-10
AVID-2026-R0352The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`.Measurement2026-03-10
AVID-2026-R0353The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`.Measurement2026-03-10
AVID-2026-R0354The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`.Measurement2026-03-10
AVID-2026-R0355The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`.Measurement2026-03-10
AVID-2026-R0356The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`.Measurement2026-03-10
AVID-2026-R0357The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`.Measurement2026-03-10
AVID-2026-R0358The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`.Measurement2026-03-10
AVID-2026-R0359The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`.Measurement2026-03-10
AVID-2026-R0360The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`.Measurement2026-03-10
AVID-2026-R0361The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`.Measurement2026-03-10
AVID-2026-R0362The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`.Measurement2026-03-10
AVID-2026-R0363The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`.Measurement2026-03-10
AVID-2026-R0364The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`.Measurement2026-03-10
AVID-2026-R0365The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`.Measurement2026-03-10
AVID-2026-R0366The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`.Measurement2026-03-10
AVID-2026-R0367The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`.Measurement2026-03-10
AVID-2026-R0368The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`.Measurement2026-03-10
AVID-2026-R0369The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`.Measurement2026-03-10
AVID-2026-R0370The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`.Measurement2026-03-10
AVID-2026-R0371The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`.Measurement2026-03-10
AVID-2026-R0372The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`.Measurement2026-03-10
AVID-2026-R0373The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`.Measurement2026-03-10
AVID-2026-R0374The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`.Measurement2026-03-10
AVID-2026-R0375The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`.Measurement2026-03-10
AVID-2026-R0376The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`.Measurement2026-03-10
AVID-2026-R0377The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`.Measurement2026-03-10
AVID-2026-R0378The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`.Measurement2026-03-10
AVID-2026-R0379The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`.Measurement2026-03-10
AVID-2026-R0380The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`.Measurement2026-03-10
AVID-2026-R0381The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`.Measurement2026-03-10
AVID-2026-R0382The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`.Measurement2026-03-10
AVID-2026-R0383The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`.Measurement2026-03-10
AVID-2026-R0384The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`.Measurement2026-03-10
AVID-2026-R0385The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`.Measurement2026-03-10
AVID-2026-R0386The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`.Measurement2026-03-10
AVID-2026-R0387The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`.Measurement2026-03-10
AVID-2026-R0388The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`.Measurement2026-03-10
AVID-2026-R0389The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`.Measurement2026-03-10
AVID-2026-R0390The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`.Measurement2026-03-10
AVID-2026-R0391The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`.Measurement2026-03-10
AVID-2026-R0392The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`.Measurement2026-03-10
AVID-2026-R0393The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`.Measurement2026-03-10
AVID-2026-R0394The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`.Measurement2026-03-10
AVID-2026-R0395The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`.Measurement2026-03-10
AVID-2026-R0396The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`.Measurement2026-03-10
AVID-2026-R0397The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`.Measurement2026-03-10
AVID-2026-R0398The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`.Measurement2026-03-10
AVID-2026-R0399The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`.Measurement2026-03-10
AVID-2026-R0400The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`.Measurement2026-03-10
AVID-2026-R0401The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`.Measurement2026-03-10
AVID-2026-R0402The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`.Measurement2026-03-10
AVID-2026-R0403The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`.Measurement2026-03-10
AVID-2026-R0404The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`.Measurement2026-03-10
AVID-2026-R0405The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`.Measurement2026-03-10
AVID-2026-R0406The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`.Measurement2026-03-10
AVID-2026-R0407The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`.Measurement2026-03-10
AVID-2026-R0408The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`.Measurement2026-03-10
AVID-2026-R0409The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`.Measurement2026-03-10
AVID-2026-R0410The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`.Measurement2026-03-10
AVID-2026-R0411The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`.Measurement2026-03-10
AVID-2026-R0412The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`.Measurement2026-03-10
AVID-2026-R0413OpenAI ChatGPT Content Safety Explicit Image BypassAdvisory2026-01-28
AVID-2026-R0414Eclipse Theia IDE MCP Configuration Code ExecutionAdvisory2025-11-18
AVID-2026-R0415OpenAI Codex CLI Notify Field Configuration Remote Code ExecutionAdvisory2026-01-16
AVID-2026-R0416OpenAI Codex CLI Model Provider Configuration Remote Code ExecutionAdvisory2026-01-16
AVID-2026-R0417OpenAI Codex CLI MCP Configuration Remote Code ExecutionAdvisory2026-01-19
AVID-2026-R0418Amazon Kiro IDE Data Exfiltration via Filename Prompt Injection and Kiro Powers Registry FetchingAdvisory2025-12-11
AVID-2026-R0419Amazon Kiro IDE Data Exfiltration via Steering FileAdvisory2025-12-08
AVID-2026-R0420Google Gemini CLI Tool Discovery Code ExecutionAdvisory2025-12-26
AVID-2026-R0421Google Gemini CLI MCP Configuration Code ExecutionAdvisory2025-12-26
AVID-2026-R0422JetBrains Junie AI Coding Agent guidelines.md Code ExecutionAdvisory2025-11-14
AVID-2026-R0423TheLibrarian.io Internal Cloud Environment Access via web_fetch ToolAdvisory2025-10-10
AVID-2026-R0424Zed IDE LSP Configuration Code ExecutionAdvisory2025-11-16
AVID-2026-R0425Zed IDE MCP Configuration Code ExecutionAdvisory2025-11-16
AVID-2026-R0426Google Antigravity IDE Persistent Code ExecutionAdvisory2025-11-19
AVID-2026-R0427Cline Bot AI Coding Agent Code Execution via Prompt Injection and TOCTOU Script InvocationAdvisory2025-08-27
AVID-2026-R0428Cline Bot AI Coding Agent Code Execution via Prompt Injection and .clinerules DirectivesAdvisory2025-08-27
AVID-2026-R0429Cline Bot AI Coding Agent Data Exfiltration via Prompt Injection and DNSAdvisory2025-08-27
AVID-2026-R0430Nvidia NemoGuard Jailbreak Detect Guardrail EvasionAdvisory2025-03-11
AVID-2026-R0431Protect AI Jailbreak and Prompt Injection Guardrail EvasionAdvisory2025-03-12
AVID-2026-R0432Vijil Prompt Injection Guardrail EvasionAdvisory2025-03-14
AVID-2026-R0433Meta Prompt Guard Guardrail EvasionAdvisory2025-03-11
AVID-2026-R0434Microsoft Azure Prompt Shield Guardrail EvasionAdvisory2024-06-06
AVID-2026-R0435Microsoft Azure AI Content Safety Guardrail EvasionAdvisory2024-03-04
AVID-2026-R0436Mistral Vibe CLI MCP Configuration Code ExecutionAdvisory2025-12-11
AVID-2026-R0437Mistral Vibe CLI Shell Expansion Command ExecutionAdvisory2026-01-02
AVID-2026-R0438Mistral Vibe CLI Python Tools Code ExecutionAdvisory2025-12-12
AVID-2026-R0439The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`.Measurement2026-03-17
AVID-2026-R0440The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`.Measurement2026-03-17
AVID-2026-R0441The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`.Measurement2026-03-17
AVID-2026-R0442The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`.Measurement2026-03-17
AVID-2026-R0443The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`.Measurement2026-03-17
AVID-2026-R0444The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`.Measurement2026-03-17
AVID-2026-R0445The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`.Measurement2026-03-17
AVID-2026-R0446The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`.Measurement2026-03-17
AVID-2026-R0447The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`.Measurement2026-03-17
AVID-2026-R0448The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`.Measurement2026-03-17
AVID-2026-R0449The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`.Measurement2026-03-17
AVID-2026-R0450The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`.Measurement2026-03-17
AVID-2026-R0451The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`.Measurement2026-03-17
AVID-2026-R0452The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`.Measurement2026-03-16
AVID-2026-R0453The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`.Measurement2026-03-16
AVID-2026-R0454The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`.Measurement2026-03-16
AVID-2026-R0455The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`.Measurement2026-03-16
AVID-2026-R0456The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`.Measurement2026-03-16
AVID-2026-R0457The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`.Measurement2026-03-16
AVID-2026-R0458The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`.Measurement2026-03-16
AVID-2026-R0459The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`.Measurement2026-03-16
AVID-2026-R0460The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`.Measurement2026-03-16
AVID-2026-R0461The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`.Measurement2026-03-16
AVID-2026-R0462The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`.Measurement2026-03-16
AVID-2026-R0463The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`.Measurement2026-03-16
AVID-2026-R0464The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`.Measurement2026-03-16
AVID-2026-R0465The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`.Measurement2026-03-16
AVID-2026-R0466The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`.Measurement2026-03-16
AVID-2026-R0467The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`.Measurement2026-03-16
AVID-2026-R0468The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`.Measurement2026-03-16
AVID-2026-R0469The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`.Measurement2026-03-16
AVID-2026-R0470The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`.Measurement2026-03-16
AVID-2026-R0471The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`.Measurement2026-03-16
AVID-2026-R0472The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`.Measurement2026-03-16
AVID-2026-R0473The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`.Measurement2026-03-16
AVID-2026-R0474The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`.Measurement2026-03-16
AVID-2026-R0475The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`.Measurement2026-03-16
AVID-2026-R0476The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`.Measurement2026-03-16
AVID-2026-R0477The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`.Measurement2026-03-16
AVID-2026-R0478The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`.Measurement2026-03-16
AVID-2026-R0479The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`.Measurement2026-03-16
AVID-2026-R0480The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`.Measurement2026-03-16
AVID-2026-R0481The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`.Measurement2026-03-16
AVID-2026-R0482The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`.Measurement2026-03-16
AVID-2026-R0483The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`.Measurement2026-03-16
AVID-2026-R0484The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`.Measurement2026-03-16
AVID-2026-R0485The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`.Measurement2026-03-16
AVID-2026-R0486The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`.Measurement2026-03-16
AVID-2026-R0487The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`.Measurement2026-03-16
AVID-2026-R0488The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`.Measurement2026-03-16
AVID-2026-R0489The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`.Measurement2026-03-16
AVID-2026-R0490The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`.Measurement2026-03-16
AVID-2026-R0491The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`.Measurement2026-03-16
AVID-2026-R0492The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`.Measurement2026-03-16
AVID-2026-R0493The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`.Measurement2026-03-16
AVID-2026-R0494The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`.Measurement2026-03-16
AVID-2026-R0495The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`.Measurement2026-03-16
AVID-2026-R0496The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`.Measurement2026-03-16
AVID-2026-R0497The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`.Measurement2026-03-16
AVID-2026-R0498The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`.Measurement2026-03-16
AVID-2026-R0499The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`.Measurement2026-03-16
AVID-2026-R0500The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`.Measurement2026-03-16
AVID-2026-R0501The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`.Measurement2026-03-16
AVID-2026-R0502The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`.Measurement2026-03-16
AVID-2026-R0503The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`.Measurement2026-03-16
AVID-2026-R0504The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`.Measurement2026-03-16
AVID-2026-R0505The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`.Measurement2026-03-16
AVID-2026-R0506The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`.Measurement2026-03-16
AVID-2026-R0507The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`.Measurement2026-03-16
AVID-2026-R0508The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`.Measurement2026-03-16
AVID-2026-R0509The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`.Measurement2026-03-16
AVID-2026-R0510The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`.Measurement2026-03-16
AVID-2026-R0511The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`.Measurement2026-03-16
AVID-2026-R0512The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`.Measurement2026-03-16
AVID-2026-R0513The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`.Measurement2026-03-16
AVID-2026-R0514The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`.Measurement2026-03-16
AVID-2026-R0515The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`.Measurement2026-03-16
AVID-2026-R0516The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`.Measurement2026-03-16
AVID-2026-R0517The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`.Measurement2026-03-16
AVID-2026-R0518The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`.Measurement2026-03-16
AVID-2026-R0519The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`.Measurement2026-03-16
AVID-2026-R0520The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`.Measurement2026-03-16
AVID-2026-R0521The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`.Measurement2026-03-16
AVID-2026-R0522The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`.Measurement2026-03-16
AVID-2026-R0523The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`.Measurement2026-03-16
AVID-2026-R0524The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`.Measurement2026-03-16
AVID-2026-R0525The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`.Measurement2026-03-16
AVID-2026-R0526The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`.Measurement2026-03-16
AVID-2026-R0527The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`.Measurement2026-03-16
AVID-2026-R0528The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`.Measurement2026-03-16
AVID-2026-R0529The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`.Measurement2026-03-16
AVID-2026-R0530The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`.Measurement2026-03-16
AVID-2026-R0531The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`.Measurement2026-03-16
AVID-2026-R0532The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`.Measurement2026-03-16
AVID-2026-R0533The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`.Measurement2026-03-16
AVID-2026-R0534The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`.Measurement2026-03-16
AVID-2026-R0535The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`.Measurement2026-03-16
AVID-2026-R0536The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`.Measurement2026-03-16
AVID-2026-R0537The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`.Measurement2026-03-16
AVID-2026-R0538The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`.Measurement2026-03-16
AVID-2026-R0539The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`.Measurement2026-03-16
AVID-2026-R0540The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`.Measurement2026-03-16
AVID-2026-R0541The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`.Measurement2026-03-16
AVID-2026-R0542The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`.Measurement2026-03-16
AVID-2026-R0543The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`.Measurement2026-03-16
AVID-2026-R0544The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`.Measurement2026-03-16
AVID-2026-R0545The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`.Measurement2026-03-16
AVID-2026-R0546The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`.Measurement2026-03-16
AVID-2026-R0547The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`.Measurement2026-03-16
AVID-2026-R0548The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`.Measurement2026-03-16
AVID-2026-R0549The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`.Measurement2026-03-16
AVID-2026-R0550The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`.Measurement2026-03-16
AVID-2026-R0551The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`.Measurement2026-03-16
AVID-2026-R0552The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`.Measurement2026-03-16
AVID-2026-R0553The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`.Measurement2026-03-16
AVID-2026-R0554The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`.Measurement2026-03-16
AVID-2026-R0555The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`.Measurement2026-03-16
AVID-2026-R0556The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`.Measurement2026-03-16
AVID-2026-R0557The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`.Measurement2026-03-16
AVID-2026-R0558The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`.Measurement2026-03-16
AVID-2026-R0559The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`.Measurement2026-03-16
AVID-2026-R0560The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`.Measurement2026-03-16
AVID-2026-R0561The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`.Measurement2026-03-16
AVID-2026-R0562The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`.Measurement2026-03-16
AVID-2026-R0563The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`.Measurement2026-03-16
AVID-2026-R0564The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`.Measurement2026-03-16
AVID-2026-R0565The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`.Measurement2026-03-16
AVID-2026-R0566The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`.Measurement2026-03-16
AVID-2026-R0567The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`.Measurement2026-03-16
AVID-2026-R0568The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`.Measurement2026-03-16
AVID-2026-R0569The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`.Measurement2026-03-16
AVID-2026-R0570The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`.Measurement2026-03-16
AVID-2026-R0571The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`.Measurement2026-03-16
AVID-2026-R0572The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`.Measurement2026-03-16
AVID-2026-R0573The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`.Measurement2026-03-16
AVID-2026-R0574The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`.Measurement2026-03-16
AVID-2026-R0575The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`.Measurement2026-03-16
AVID-2026-R0576The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`.Measurement2026-03-16
AVID-2026-R0577The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`.Measurement2026-03-16
AVID-2026-R0578The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`.Measurement2026-03-16
AVID-2026-R0579The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`.Measurement2026-03-16
AVID-2026-R0580The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`.Measurement2026-03-16
AVID-2026-R0581The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`.Measurement2026-03-16
AVID-2026-R0582The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`.Measurement2026-03-16
AVID-2026-R0583The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`.Measurement2026-03-16
AVID-2026-R0584The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`.Measurement2026-03-16
AVID-2026-R0585The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`.Measurement2026-03-16
AVID-2026-R0586The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`.Measurement2026-03-16
AVID-2026-R0587The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`.Measurement2026-03-16
AVID-2026-R0588The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`.Measurement2026-03-16
AVID-2026-R0589The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`.Measurement2026-03-16
AVID-2026-R0590The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`.Measurement2026-03-16
AVID-2026-R0591The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`.Measurement2026-03-16
AVID-2026-R0592The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`.Measurement2026-03-16
AVID-2026-R0593The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`.Measurement2026-03-16
AVID-2026-R0594The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`.Measurement2026-03-16
AVID-2026-R0595The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`.Measurement2026-03-16
AVID-2026-R0596The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`.Measurement2026-03-16
AVID-2026-R0597The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`.Measurement2026-03-16
AVID-2026-R0598The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`.Measurement2026-03-16
AVID-2026-R0599The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`.Measurement2026-03-16
AVID-2026-R0600The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`.Measurement2026-03-16
AVID-2026-R0601The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`.Measurement2026-03-16
AVID-2026-R0602The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`.Measurement2026-03-16
AVID-2026-R0603The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`.Measurement2026-03-16
AVID-2026-R0604The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`.Measurement2026-03-16
AVID-2026-R0605The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`.Measurement2026-03-16
AVID-2026-R0606The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`.Measurement2026-03-16
AVID-2026-R0607The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`.Measurement2026-03-16
AVID-2026-R0608The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`.Measurement2026-03-16
AVID-2026-R0609The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`.Measurement2026-03-16
AVID-2026-R0610The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`.Measurement2026-03-16
AVID-2026-R0611The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`.Measurement2026-03-16
AVID-2026-R0612The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`.Measurement2026-03-16
AVID-2026-R0613The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`.Measurement2026-03-16
AVID-2026-R0614The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`.Measurement2026-03-16
AVID-2026-R0615The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`.Measurement2026-03-16
AVID-2026-R0616The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`.Measurement2026-03-16
AVID-2026-R0617The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`.Measurement2026-03-16
AVID-2026-R0618The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`.Measurement2026-03-16
AVID-2026-R0619The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`.Measurement2026-03-16
AVID-2026-R0620The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`.Measurement2026-03-16
AVID-2026-R0621The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`.Measurement2026-03-16
AVID-2026-R0622The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`.Measurement2026-03-16
AVID-2026-R0623The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`.Measurement2026-03-16
AVID-2026-R0624The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`.Measurement2026-03-16
AVID-2026-R0625The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`.Measurement2026-03-16
AVID-2026-R0626The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`.Measurement2026-03-16
AVID-2026-R0627The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`.Measurement2026-03-16
AVID-2026-R0628The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`.Measurement2026-03-17
AVID-2026-R0629The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`.Measurement2026-03-17
AVID-2026-R0630The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`.Measurement2026-03-17
AVID-2026-R0631The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`.Measurement2026-03-17
AVID-2026-R0632The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`.Measurement2026-03-17
AVID-2026-R0633The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`.Measurement2026-03-17
AVID-2026-R0634The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`.Measurement2026-03-17
AVID-2026-R0635The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`.Measurement2026-03-17
AVID-2026-R0636The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`.Measurement2026-03-17
AVID-2026-R0637The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`.Measurement2026-03-17
AVID-2026-R0638The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`.Measurement2026-03-17
AVID-2026-R0639The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`.Measurement2026-03-17
AVID-2026-R0640The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`.Measurement2026-03-17
AVID-2026-R0641The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`.Measurement2026-03-17
AVID-2026-R0642The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`.Measurement2026-03-17
AVID-2026-R0643The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`.Measurement2026-03-17
AVID-2026-R0644The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`.Measurement2026-03-17
AVID-2026-R0645The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`.Measurement2026-03-17
AVID-2026-R0646The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`.Measurement2026-03-17
AVID-2026-R0647The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`.Measurement2026-03-17
AVID-2026-R0648The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`.Measurement2026-03-17
AVID-2026-R0649The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`.Measurement2026-03-17
AVID-2026-R0650The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`.Measurement2026-03-17
AVID-2026-R0651The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`.Measurement2026-03-17
AVID-2026-R0652The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`.Measurement2026-03-17
AVID-2026-R0653The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`.Measurement2026-03-17
AVID-2026-R0654The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`.Measurement2026-03-17
AVID-2026-R0655The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`.Measurement2026-03-17
AVID-2026-R0656The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`.Measurement2026-03-17
AVID-2026-R0657The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`.Measurement2026-03-17
AVID-2026-R0658The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`.Measurement2026-03-17
AVID-2026-R0659The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`.Measurement2026-03-17
AVID-2026-R0660The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`.Measurement2026-03-17
AVID-2026-R0661The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`.Measurement2026-03-17
AVID-2026-R0662The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`.Measurement2026-03-17
AVID-2026-R0663The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`.Measurement2026-03-17
AVID-2026-R0664The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`.Measurement2026-03-17
AVID-2026-R0665The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`.Measurement2026-03-17
AVID-2026-R0666The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`.Measurement2026-03-17
AVID-2026-R0667The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`.Measurement2026-03-17
AVID-2026-R0668The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`.Measurement2026-03-17
AVID-2026-R0669The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`.Measurement2026-03-17
AVID-2026-R0670The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`.Measurement2026-03-17
AVID-2026-R0671The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`.Measurement2026-03-17
AVID-2026-R0672The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`.Measurement2026-03-17
AVID-2026-R0673The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`.Measurement2026-03-17
AVID-2026-R0674The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`.Measurement2026-03-17
AVID-2026-R0675The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`.Measurement2026-03-17
AVID-2026-R0676The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`.Measurement2026-03-17
AVID-2026-R0677The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`.Measurement2026-03-17
AVID-2026-R0678The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`.Measurement2026-03-17
AVID-2026-R0679The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`.Measurement2026-03-17
AVID-2026-R0680The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`.Measurement2026-03-17
AVID-2026-R0681The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`.Measurement2026-03-17
AVID-2026-R0682The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`.Measurement2026-03-17
AVID-2026-R0683The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`.Measurement2026-03-17
AVID-2026-R0684The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`.Measurement2026-03-17
AVID-2026-R0685The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`.Measurement2026-03-17
AVID-2026-R0686The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`.Measurement2026-03-17
AVID-2026-R0687The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`.Measurement2026-03-17
AVID-2026-R0688The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`.Measurement2026-03-17
AVID-2026-R0689The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`.Measurement2026-03-17
AVID-2026-R0690The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`.Measurement2026-03-17
AVID-2026-R0691The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`.Measurement2026-03-17
AVID-2026-R0692The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`.Measurement2026-03-17
AVID-2026-R0693The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`.Measurement2026-03-17
AVID-2026-R0694The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`.Measurement2026-03-17
AVID-2026-R0695The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`.Measurement2026-03-17
AVID-2026-R0696The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`.Measurement2026-03-17
AVID-2026-R0697The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`.Measurement2026-03-17
AVID-2026-R0698The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`.Measurement2026-03-17
AVID-2026-R0699The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`.Measurement2026-03-17
AVID-2026-R0700The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`.Measurement2026-03-17
AVID-2026-R0701The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`.Measurement2026-03-17
AVID-2026-R0702The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`.Measurement2026-03-17
AVID-2026-R0703Evaluation of the AI system gpt-5-nano on the bbq benchmark using Inspect EvalsMeasurement2026-03-11
AVID-2026-R0704Evaluation of the LLM MiniMax-M2.5 on the bbq benchmark using Inspect EvalsMeasurement2026-03-17
AVID-2026-R0705Evaluation of the LLM gpt-oss-20b on the bbq benchmark using Inspect EvalsMeasurement2026-03-17
AVID-2026-R0706Evaluation of the LLM gemma-3n-E4B-it on the bbq benchmark using Inspect EvalsMeasurement2026-03-17
AVID-2026-R0707Evaluation of the LLM LFM2-24B-A2B on the bbq benchmark using Inspect EvalsMeasurement2026-03-17
AVID-2026-R0708Evaluation of the LLM rnj-1-instruct on the bbq benchmark using Inspect EvalsMeasurement2026-03-17
AVID-2026-R0709Evaluation of the LLM rnj-1-instruct on the bold benchmark using Inspect EvalsMeasurement2026-03-17
AVID-2026-R0710Vulnerability CVE-2021-1114Advisory2021-08-11
AVID-2026-R0711Bot Framework SDK Information Disclosure Vulnerability (CVE-2021-1725)Advisory2021-01-12
AVID-2026-R0712MongoDB Node.js client side field level encryption library may not be validating KMS certificate (CVE-2021-20327)Advisory2021-02-25
AVID-2026-R0713Vulnerability CVE-2021-20486Advisory2021-05-26
AVID-2026-R0714Vulnerability CVE-2021-2138Advisory2021-03-03
AVID-2026-R0715Vulnerability CVE-2021-21605Advisory2021-01-13
AVID-2026-R0716Vulnerability CVE-2021-21677Advisory2021-08-31
AVID-2026-R0717Vulnerability CVE-2021-22205Advisory2021-04-23
AVID-2026-R0718Denial of Service of protobuf-java parsing procedure (CVE-2021-22569)Advisory2022-01-07
AVID-2026-R0719Deserialization of Untrusted Data (CVE-2021-23338)Advisory2021-02-15
AVID-2026-R0720Authenticated users can override system configurations in their requests which allows them to execute arbitrary code. (CVE-2021-25646)Advisory2021-01-29
AVID-2026-R0721Apache Airflow: Lineage API endpoint for Experimental API missed authentication check (CVE-2021-26697)Advisory2021-02-17
AVID-2026-R0722Apache Druid Authenticated users can execute arbitrary code from malicious MySQL database systems. (CVE-2021-26919)Advisory2021-03-30
AVID-2026-R0723TIBCO Spotfire Windows Platform Artifact Search vulnerability (CVE-2021-28830)Advisory2021-06-29
AVID-2026-R0724Heap buffer overflow in `RaggedBinCount` (CVE-2021-29512)Advisory2021-05-14
AVID-2026-R0725Type confusion during tensor casts lead to dereferencing null pointers (CVE-2021-29513)Advisory2021-05-14
AVID-2026-R0726Heap out of bounds write in `RaggedBinCount` (CVE-2021-29514)Advisory2021-05-14
AVID-2026-R0727Reference binding to null pointer in `MatrixDiag*` ops (CVE-2021-29515)Advisory2021-05-14
AVID-2026-R0728Null pointer dereference via invalid Ragged Tensors (CVE-2021-29516)Advisory2021-05-14
AVID-2026-R0729Division by zero in `Conv3D` (CVE-2021-29517)Advisory2021-05-14
AVID-2026-R0730Session operations in eager mode lead to null pointer dereferences (CVE-2021-29518)Advisory2021-05-14
AVID-2026-R0731CHECK-fail in SparseCross due to type confusion (CVE-2021-29519)Advisory2021-05-14
AVID-2026-R0732Heap buffer overflow in `Conv3DBackprop*` (CVE-2021-29520)Advisory2021-05-14
AVID-2026-R0733Segfault in SparseCountSparseOutput (CVE-2021-29521)Advisory2021-05-14
AVID-2026-R0734Division by 0 in `Conv3DBackprop*` (CVE-2021-29522)Advisory2021-05-14
AVID-2026-R0735CHECK-fail in AddManySparseToTensorsMap (CVE-2021-29523)Advisory2021-05-14
AVID-2026-R0736Division by 0 in `Conv2DBackpropInput` (CVE-2021-29525)Advisory2021-05-14
AVID-2026-R0737Heap buffer overflow caused by rounding (CVE-2021-29529)Advisory2021-05-14
AVID-2026-R0738Invalid validation in `SparseMatrixSparseCholesky` (CVE-2021-29530)Advisory2021-05-14
AVID-2026-R0739CHECK-fail in tf.raw_ops.EncodePng (CVE-2021-29531)Advisory2021-05-14
AVID-2026-R0740Heap out of bounds read in `RaggedCross` (CVE-2021-29532)Advisory2021-05-14
AVID-2026-R0741CHECK-fail in DrawBoundingBoxes (CVE-2021-29533)Advisory2021-05-14
AVID-2026-R0742CHECK-fail in SparseConcat (CVE-2021-29534)Advisory2021-05-14
AVID-2026-R0743Heap buffer overflow in `QuantizedMul` (CVE-2021-29535)Advisory2021-05-14
AVID-2026-R0744Heap buffer overflow in `QuantizedReshape` (CVE-2021-29536)Advisory2021-05-14
AVID-2026-R0745Heap buffer overflow in `QuantizedResizeBilinear` (CVE-2021-29537)Advisory2021-05-14
AVID-2026-R0746Division by zero in `Conv2DBackpropFilter` (CVE-2021-29538)Advisory2021-05-14
AVID-2026-R0747Segfault in tf.raw_ops.ImmutableConst (CVE-2021-29539)Advisory2021-05-14
AVID-2026-R0748Heap buffer overflow in `Conv2DBackpropFilter` (CVE-2021-29540)Advisory2021-05-14
AVID-2026-R0749Null pointer dereference in `StringNGrams` (CVE-2021-29541)Advisory2021-05-14
AVID-2026-R0750Heap buffer overflow in `StringNGrams` (CVE-2021-29542)Advisory2021-05-14
AVID-2026-R0751CHECK-fail in `CTCGreedyDecoder` (CVE-2021-29543)Advisory2021-05-14
AVID-2026-R0752CHECK-fail in `QuantizeAndDequantizeV4Grad` (CVE-2021-29544)Advisory2021-05-14
AVID-2026-R0753Heap buffer overflow in `SparseTensorToCSRSparseMatrix` (CVE-2021-29545)Advisory2021-05-14
AVID-2026-R0754Division by 0 in `QuantizedBiasAdd` (CVE-2021-29546)Advisory2021-05-14
AVID-2026-R0755Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization` (CVE-2021-29547)Advisory2021-05-14
AVID-2026-R0756Division by 0 in `QuantizedBatchNormWithGlobalNormalization` (CVE-2021-29548)Advisory2021-05-14
AVID-2026-R0757Division by 0 in `QuantizedAdd` (CVE-2021-29549)Advisory2021-05-14
AVID-2026-R0758OOB read in `MatrixTriangularSolve` (CVE-2021-29551)Advisory2021-05-14
AVID-2026-R0759Heap OOB in `QuantizeAndDequantizeV3` (CVE-2021-29553)Advisory2021-05-14
AVID-2026-R0760Division by 0 in `DenseCountSparseOutput` (CVE-2021-29554)Advisory2021-05-14
AVID-2026-R0761Division by 0 in `FusedBatchNorm` (CVE-2021-29555)Advisory2021-05-14
AVID-2026-R0762Division by 0 in `SparseMatMul` (CVE-2021-29557)Advisory2021-05-14
AVID-2026-R0763Heap buffer overflow in `SparseSplit` (CVE-2021-29558)Advisory2021-05-14
AVID-2026-R0764Heap OOB access in unicode ops (CVE-2021-29559)Advisory2021-05-14
AVID-2026-R0765Heap buffer overflow in `RaggedTensorToTensor` (CVE-2021-29560)Advisory2021-05-14
AVID-2026-R0766CHECK-fail in `LoadAndRemapMatrix` (CVE-2021-29561)Advisory2021-05-14
AVID-2026-R0767CHECK-fail in `tf.raw_ops.IRFFT` (CVE-2021-29562)Advisory2021-05-14
AVID-2026-R0768CHECK-fail in `tf.raw_ops.RFFT` (CVE-2021-29563)Advisory2021-05-14
AVID-2026-R0769Null pointer dereference in `EditDistance` (CVE-2021-29564)Advisory2021-05-14
AVID-2026-R0770Null pointer dereference in `SparseFillEmptyRows` (CVE-2021-29565)Advisory2021-05-14
AVID-2026-R0771Heap OOB access in `Dilation2DBackpropInput` (CVE-2021-29566)Advisory2021-05-14
AVID-2026-R0772Lack of validation in `SparseDenseCwiseMul` (CVE-2021-29567)Advisory2021-05-14
AVID-2026-R0773Reference binding to null in `ParameterizedTruncatedNormal` (CVE-2021-29568)Advisory2021-05-14
AVID-2026-R0774Heap out of bounds read in `RequantizationRange` (CVE-2021-29569)Advisory2021-05-14
AVID-2026-R0775Heap out of bounds read in `MaxPoolGradWithArgmax` (CVE-2021-29570)Advisory2021-05-14
AVID-2026-R0776Memory corruption in `DrawBoundingBoxesV2` (CVE-2021-29571)Advisory2021-05-14
AVID-2026-R0777Reference binding to nullptr in `SdcaOptimizer` (CVE-2021-29572)Advisory2021-05-14
AVID-2026-R0778Undefined behavior in `MaxPool3DGradGrad` (CVE-2021-29574)Advisory2021-05-14
AVID-2026-R0779Overflow/denial of service in `tf.raw_ops.ReverseSequence` (CVE-2021-29575)Advisory2021-05-14
AVID-2026-R0780Heap buffer overflow in `MaxPool3DGradGrad` (CVE-2021-29576)Advisory2021-05-14
AVID-2026-R0781Heap buffer overflow in `AvgPool3DGrad` (CVE-2021-29577)Advisory2021-05-14
AVID-2026-R0782Heap buffer overflow in `FractionalAvgPoolGrad` (CVE-2021-29578)Advisory2021-05-14
AVID-2026-R0783Heap buffer overflow in `MaxPoolGrad` (CVE-2021-29579)Advisory2021-05-14
AVID-2026-R0784Undefined behavior and `CHECK`-fail in `FractionalMaxPoolGrad` (CVE-2021-29580)Advisory2021-05-14
AVID-2026-R0785Segfault in `CTCBeamSearchDecoder` (CVE-2021-29581)Advisory2021-05-14
AVID-2026-R0786Heap OOB read in `tf.raw_ops.Dequantize` (CVE-2021-29582)Advisory2021-05-14
AVID-2026-R0787Heap buffer overflow and undefined behavior in `FusedBatchNorm` (CVE-2021-29583)Advisory2021-05-14
AVID-2026-R0788CHECK-fail due to integer overflow (CVE-2021-29584)Advisory2021-05-14
AVID-2026-R0789Division by zero in padding computation in TFLite (CVE-2021-29585)Advisory2021-05-14
AVID-2026-R0790Division by zero in TFLite's implementation of `TransposeConv` (CVE-2021-29588)Advisory2021-05-14
AVID-2026-R0791Heap OOB read in TFLite's implementation of `Minimum` or `Maximum` (CVE-2021-29590)Advisory2021-05-14
AVID-2026-R0792Null pointer dereference in TFLite's `Reshape` operator (CVE-2021-29592)Advisory2021-05-14
AVID-2026-R0793Division by zero in TFLite's convolution code (CVE-2021-29594)Advisory2021-05-14
AVID-2026-R0794Division by zero in TFLite's implementation of `DepthToSpace` (CVE-2021-29595)Advisory2021-05-14
AVID-2026-R0795Division by zero in TFLite's implementation of `EmbeddingLookup` (CVE-2021-29596)Advisory2021-05-14
AVID-2026-R0796Heap OOB write in TFLite (CVE-2021-29603)Advisory2021-05-14
AVID-2026-R0797Division by zero in TFLite's implementation of hashtable lookup (CVE-2021-29604)Advisory2021-05-14
AVID-2026-R0798Integer overflow in TFLite memory allocation (CVE-2021-29605)Advisory2021-05-14
AVID-2026-R0799Heap OOB read in TFLite (CVE-2021-29606)Advisory2021-05-14
AVID-2026-R0800Heap OOB and null pointer dereference in `RaggedTensorToTensor` (CVE-2021-29608)Advisory2021-05-14
AVID-2026-R0801Incomplete validation in `SparseAdd` (CVE-2021-29609)Advisory2021-05-14
AVID-2026-R0802Incomplete validation in `SparseReshape` (CVE-2021-29611)Advisory2021-05-14
AVID-2026-R0803Heap buffer overflow in `BandedTriangularSolve` (CVE-2021-29612)Advisory2021-05-14
AVID-2026-R0804Incomplete validation in `tf.raw_ops.CTCLoss` (CVE-2021-29613)Advisory2021-05-14
AVID-2026-R0805Interpreter crash from `tf.io.decode_raw` (CVE-2021-29614)Advisory2021-05-14
AVID-2026-R0806Stack overflow in `ParseAttrValue` with nested tensors (CVE-2021-29615)Advisory2021-05-14
AVID-2026-R0807Null dereference in Grappler's `TrySimplify` (CVE-2021-29616)Advisory2021-05-14
AVID-2026-R0808Crash in `tf.strings.substr` due to `CHECK`-fail (CVE-2021-29617)Advisory2021-05-14
AVID-2026-R0809Crash in `tf.transpose` with complex inputs (CVE-2021-29618)Advisory2021-05-14
AVID-2026-R0810Segfault in `tf.raw_ops.SparseCountSparseOutput` (CVE-2021-29619)Advisory2021-05-14
AVID-2026-R0811Vulnerability CVE-2021-29730Advisory2021-07-09
AVID-2026-R0812Vulnerability CVE-2021-31681Advisory2023-07-31
AVID-2026-R0813Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint (CVE-2021-32635)Advisory2021-05-28
AVID-2026-R0814JupyterLab: XSS due to lack of sanitization of the action attribute of an html
(CVE-2021-32797)
Advisory2021-08-09
AVID-2026-R0815Regular Expression Denial of Service in flask-restx (CVE-2021-32838)Advisory2021-09-20
AVID-2026-R0816Vulnerability CVE-2021-33073Advisory2021-11-17
AVID-2026-R0817Vulnerability CVE-2021-33430Advisory2021-12-17
AVID-2026-R0818Vulnerability CVE-2021-33648Advisory2022-06-27
AVID-2026-R0819Vulnerability CVE-2021-33650Advisory2022-06-27
AVID-2026-R0820Vulnerability CVE-2021-33651Advisory2022-06-27
AVID-2026-R0821Mysql JDBC Connector Deserialize RCE (CVE-2021-36774)Advisory2022-01-06
AVID-2026-R0822Deleting PRTBs associated to a group doesn't cause deletion of corresponding RoleBindings (CVE-2021-36775)Advisory2022-04-01
AVID-2026-R0823Exposure of repository credentials to external third-party sources (CVE-2021-36778)Advisory2022-05-02
AVID-2026-R0824Vulnerability CVE-2021-3702Advisory2022-08-23
AVID-2026-R0825Heap out of bounds access in sparse reduction operations in TensorFlow (CVE-2021-37635)Advisory2021-08-12
AVID-2026-R0826Floating point exception in `SparseDenseCwiseDiv` in TensorFlow (CVE-2021-37636)Advisory2021-08-12
AVID-2026-R0827Null pointer dereference in `CompressElement` in TensorFlow (CVE-2021-37637)Advisory2021-08-12
AVID-2026-R0828Null pointer dereference in `RaggedTensorToTensor` in TensorFlow (CVE-2021-37638)Advisory2021-08-12
AVID-2026-R0829Null pointer dereference and heap OOB read in TensorFlow (CVE-2021-37639)Advisory2021-08-12
AVID-2026-R0830Integer division by 0 in sparse reshaping in TensorFlow (CVE-2021-37640)Advisory2021-08-12
AVID-2026-R0831Heap OOB in `RaggedGather` in TensorFlow (CVE-2021-37641)Advisory2021-08-12
AVID-2026-R0832Division by 0 in `ResourceScatterDiv` in TensorFlow (CVE-2021-37642)Advisory2021-08-12
AVID-2026-R0833Null pointer dereference in `MatrixDiagPartOp` in TensorFlow (CVE-2021-37643)Advisory2021-08-12
AVID-2026-R0834`std::abort` raised from `TensorListReserve` in TensorFlow (CVE-2021-37644)Advisory2021-08-12
AVID-2026-R0835Integer overflow due to conversion to unsigned in TensorFlow (CVE-2021-37645)Advisory2021-08-12
AVID-2026-R0836Bad alloc in `StringNGrams` caused by integer conversion in TensorFlow (CVE-2021-37646)Advisory2021-08-12
AVID-2026-R0837Null pointer dereference in `SparseTensorSliceDataset` in TensorFlow (CVE-2021-37647)Advisory2021-08-12
AVID-2026-R0838Incorrect validation of `SaveV2` inputs in TensorFlow (CVE-2021-37648)Advisory2021-08-12
AVID-2026-R0839Null pointer dereference in `UncompressElement` in TensorFlow (CVE-2021-37649)Advisory2021-08-12
AVID-2026-R0840Segfault and heap buffer overflow in `{Experimental,}DatasetToTFRecord` in TensorFlow (CVE-2021-37650)Advisory2021-08-12
AVID-2026-R0841Heap buffer overflow in `FractionalAvgPoolGrad` in TensorFlow (CVE-2021-37651)Advisory2021-08-12
AVID-2026-R0842Use after free in boosted trees creation in TensorFlow (CVE-2021-37652)Advisory2021-08-12
AVID-2026-R0843Division by 0 in `ResourceGather` in TensorFlow (CVE-2021-37653)Advisory2021-08-12
AVID-2026-R0844Heap OOB and CHECK fail in `ResourceGather` in TensorFlow (CVE-2021-37654)Advisory2021-08-12
AVID-2026-R0845Heap OOB in `ResourceScatterUpdate` in TensorFlow (CVE-2021-37655)Advisory2021-08-12
AVID-2026-R0846Reference binding to nullptr in `RaggedTensorToSparse` in TensorFlow (CVE-2021-37656)Advisory2021-08-12
AVID-2026-R0847Reference binding to nullptr in `MatrixDiagV*` ops in TensorFlow (CVE-2021-37657)Advisory2021-08-12
AVID-2026-R0848Reference binding to nullptr in `MatrixSetDiagV*` ops in TensorFlow (CVE-2021-37658)Advisory2021-08-12
AVID-2026-R0849Out of bounds read via null pointer dereference in TensorFlow (CVE-2021-37659)Advisory2021-08-12
AVID-2026-R0850Division by 0 in inplace operations in TensorFlow (CVE-2021-37660)Advisory2021-08-12
AVID-2026-R0851Crash caused by integer conversion to unsigned in TensorFlow (CVE-2021-37661)Advisory2021-08-12
AVID-2026-R0852Reference binding to nullptr in boosted trees in TensorFlow (CVE-2021-37662)Advisory2021-08-12
AVID-2026-R0853Incomplete validation in `QuantizeV2` in TensorFlow (CVE-2021-37663)Advisory2021-08-12
AVID-2026-R0854Heap OOB in boosted trees in TensorFlow (CVE-2021-37664)Advisory2021-08-12
AVID-2026-R0855Incomplete validation in MKL requantization in TensorFlow (CVE-2021-37665)Advisory2021-08-12
AVID-2026-R0856Reference binding to nullptr in `RaggedTensorToVariant` in TensorFlow (CVE-2021-37666)Advisory2021-08-12
AVID-2026-R0857Reference binding to nullptr in unicode encoding in TensorFlow (CVE-2021-37667)Advisory2021-08-12
AVID-2026-R0858Division by zero in TensorFlow Lite `tf.raw_ops.UnravelIndex` (CVE-2021-37668)Advisory2021-08-12
AVID-2026-R0859Crash in NMS ops caused by integer conversion to unsigned in TensorFlow (CVE-2021-37669)Advisory2021-08-12
AVID-2026-R0860Heap OOB in `UpperBound` and `LowerBound` in TensorFlow (CVE-2021-37670)Advisory2021-08-12
AVID-2026-R0861Reference binding to nullptr in map operations in TensorFlow (CVE-2021-37671)Advisory2021-08-12
AVID-2026-R0862Heap OOB in `SdcaOptimizerV2` in TensorFlow (CVE-2021-37672)Advisory2021-08-12
AVID-2026-R0863`CHECK`-fail in `MapStage` in TensorFlow (CVE-2021-37673)Advisory2021-08-12
AVID-2026-R0864Incomplete validation in `MaxPoolGrad` in TensorFlow (CVE-2021-37674)Advisory2021-08-12
AVID-2026-R0865Division by 0 in most convolution operators in TensorFlow (CVE-2021-37675)Advisory2021-08-12
AVID-2026-R0866Reference binding to nullptr in shape inference in TensorFlow (CVE-2021-37676)Advisory2021-08-12
AVID-2026-R0867Missing validation in shape inference for `Dequantize` in TensorFlow (CVE-2021-37677)Advisory2021-08-12
AVID-2026-R0868Heap OOB in nested `tf.map_fn` with `RaggedTensor`s in TensorFlow (CVE-2021-37679)Advisory2021-08-12
AVID-2026-R0869Division by zero in TFLite in TensorFlow (CVE-2021-37680)Advisory2021-08-12
AVID-2026-R0870Null pointer exception in TensorFlow Lite (CVE-2021-37681)Advisory2021-08-12
AVID-2026-R0871Division by zero in TensorFlow Lite division operations (CVE-2021-37683)Advisory2021-08-12
AVID-2026-R0872Division by zero in TensorFlow Lite pooling operations (CVE-2021-37684)Advisory2021-08-12
AVID-2026-R0873Heap OOB in TensorFlow Lite (CVE-2021-37685)Advisory2021-08-12
AVID-2026-R0874Infinite loop in TensorFlow Lite (CVE-2021-37686)Advisory2021-08-12
AVID-2026-R0875Heap OOB in TensorFlow Lite's `Gather*` implementations (CVE-2021-37687)Advisory2021-08-12
AVID-2026-R0876Null pointer dereference in TensorFlow Lite (CVE-2021-37688)Advisory2021-08-12
AVID-2026-R0877Use after free and segfault in shape inference functions in TensorFlow (CVE-2021-37690)Advisory2021-08-12
AVID-2026-R0878Segfault on strings tensors with mistmatched dimensions in TensorFlow (CVE-2021-37692)Advisory2021-08-12
AVID-2026-R0879Shell Command Injection Vulnerability in Nimbus Thrift Server (CVE-2021-38294)Advisory2021-10-25
AVID-2026-R0880Apache Spark Key Negotiation Vulnerability (CVE-2021-38296)Advisory2022-03-10
AVID-2026-R0881Improper Restriction of XML External Entity Reference in stanfordnlp/corenlp (CVE-2021-3869)Advisory2021-10-19
AVID-2026-R0882Improper Restriction of XML External Entity Reference in stanfordnlp/corenlp (CVE-2021-3878)Advisory2021-10-15
AVID-2026-R0883Dependency injection in NVCaffe (CVE-2021-39158)Advisory2021-08-23
AVID-2026-R0884Code injection in nbgitpuller (CVE-2021-39160)Advisory2021-08-25
AVID-2026-R0885Vulnerability CVE-2021-39906Advisory2021-11-04
AVID-2026-R0886Improperly Implemented path matching for in-toto-golang (CVE-2021-41087)Advisory2021-09-21
AVID-2026-R0887Splash authentication credentials potentially leaked to target websites in scrapy-splash (CVE-2021-41124)Advisory2021-10-05
AVID-2026-R0888Crash in `tf.math.segment_*` operations (CVE-2021-41195)Advisory2021-11-05
AVID-2026-R0889Crash in `max_pool3d` when size argument is 0 or negative (CVE-2021-41196)Advisory2021-11-05
AVID-2026-R0890Crashes due to overflow and `CHECK`-fail in ops with large tensor shapes (CVE-2021-41197)Advisory2021-11-05
AVID-2026-R0891Overflow/crash in `tf.tile` when tiling tensor is large (CVE-2021-41198)Advisory2021-11-05
AVID-2026-R0892Overflow/crash in `tf.image.resize` when size is large (CVE-2021-41199)Advisory2021-11-05
AVID-2026-R0893Incomplete validation in `tf.summary.create_file_writer` (CVE-2021-41200)Advisory2021-11-05
AVID-2026-R0894Unitialized access in `EinsumHelper::ParseEquation` (CVE-2021-41201)Advisory2021-11-05
AVID-2026-R0895Overflow/crash in `tf.range` (CVE-2021-41202)Advisory2021-11-05
AVID-2026-R0896Missing validation during checkpoint loading (CVE-2021-41203)Advisory2021-11-05
AVID-2026-R0897Segfault while copying constant resource tensor (CVE-2021-41204)Advisory2021-11-05
AVID-2026-R0898Heap OOB read in all `tf.raw_ops.QuantizeAndDequantizeV*` ops (CVE-2021-41205)Advisory2021-11-05
AVID-2026-R0899Incomplete validation of shapes in multiple TF ops (CVE-2021-41206)Advisory2021-11-05
AVID-2026-R0900Division by zero in `ParallelConcat` (CVE-2021-41207)Advisory2021-11-05
AVID-2026-R0901FPE in convolutions with zero size filters (CVE-2021-41209)Advisory2021-11-05
AVID-2026-R0902Heap OOB read in `tf.raw_ops.SparseCountSparseOutput` (CVE-2021-41210)Advisory2021-11-05
AVID-2026-R0903Heap OOB read in shape inference for `QuantizeV2` (CVE-2021-41211)Advisory2021-11-05
AVID-2026-R0904Heap OOB read in `tf.ragged.cross` (CVE-2021-41212)Advisory2021-11-05
AVID-2026-R0905Reference binding to `nullptr` in `tf.ragged.cross` (CVE-2021-41214)Advisory2021-11-05
AVID-2026-R0906Null pointer exception in `DeserializeSparse` (CVE-2021-41215)Advisory2021-11-05
AVID-2026-R0907Heap buffer overflow in `Transpose` (CVE-2021-41216)Advisory2021-11-05
AVID-2026-R0908Null pointer exception when `Exit` node is not preceded by `Enter` op (CVE-2021-41217)Advisory2021-11-05
AVID-2026-R0909Integer division by 0 in `tf.raw_ops.AllToAll` (CVE-2021-41218)Advisory2021-11-05
AVID-2026-R0910Undefined behavior via `nullptr` reference binding in sparse matrix multiplication (CVE-2021-41219)Advisory2021-11-05
AVID-2026-R0911Use after free in `CollectiveReduceV2` (CVE-2021-41220)Advisory2021-11-05
AVID-2026-R0912Access to invalid memory during shape inference in `Cudnn*` ops (CVE-2021-41221)Advisory2021-11-05
AVID-2026-R0913Segfault due to negative splits in `SplitV` (CVE-2021-41222)Advisory2021-11-05
AVID-2026-R0914Heap OOB read in `FusedBatchNorm` kernels (CVE-2021-41223)Advisory2021-11-05
AVID-2026-R0915`SparseFillEmptyRows` heap OOB read (CVE-2021-41224)Advisory2021-11-05
AVID-2026-R0916Heap OOB read in `SparseBinCount` (CVE-2021-41226)Advisory2021-11-05
AVID-2026-R0917Code injection in `saved_model_cli` (CVE-2021-41228)Advisory2021-11-05
AVID-2026-R0918Vulnerability CVE-2021-41495Advisory2021-12-17
AVID-2026-R0919Apache Parquet-MR potential DoS in case of malicious Parquet file (CVE-2021-41561)Advisory2021-12-20
AVID-2026-R0920Vulnerability CVE-2021-42343Advisory2021-10-26
AVID-2026-R0921Vulnerability CVE-2021-42951Advisory2022-03-01
AVID-2026-R0922Vulnerability CVE-2021-42969Advisory2022-05-13
AVID-2026-R0923Bot Framework SDK Remote Code Execution Vulnerability (CVE-2021-43225)Advisory2021-12-15
AVID-2026-R0924Inefficient Regular Expression Complexity in nltk (CVE-2021-43854)Advisory2021-12-23
AVID-2026-R0925Chain Sea Information Integration Co., Ltd ai chatbot system - Reflected XSS (CVE-2021-44163)Advisory2021-12-20
AVID-2026-R0926Chain Sea Information Integration Co., Ltd ai chatbot system - Arbitrary File Upload (CVE-2021-44164)Advisory2021-12-20
AVID-2026-R0927Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints (CVE-2021-44228)Advisory2021-12-10
AVID-2026-R0928Apache Log4j2 vulnerable to RCE via JDBC Appender when attacker controls configuration (CVE-2021-44832)Advisory2021-12-28
AVID-2026-R0929Vulnerability CVE-2021-45074Advisory2022-03-02
AVID-2026-R0930Apache Airflow: Reflected XSS via Origin Query Argument in URL (CVE-2021-45229)Advisory2022-02-25
AVID-2026-R0931Log4j hot patch package privilege escalation (CVE-2022-0070)Advisory2022-04-19
AVID-2026-R0932Improper Restriction of XML External Entity Reference in stanfordnlp/corenlp (CVE-2022-0198)Advisory2022-01-13
AVID-2026-R0933Vulnerability CVE-2022-0573Advisory2022-05-16
AVID-2026-R0934Vulnerability CVE-2022-0668Advisory2023-01-08
AVID-2026-R0935Code Injection in pytorchlightning/pytorch-lightning (CVE-2022-0845)Advisory2022-03-05
AVID-2026-R0936Vulnerability CVE-2022-1423Advisory2022-05-19
AVID-2026-R0937Out of Memory issue in ProtocolBuffers for cpp and python (CVE-2022-1941)Advisory2022-09-22
AVID-2026-R0938Vulnerability CVE-2022-20617Advisory2022-01-12
AVID-2026-R0939Pipenv's requirements.txt parsing allows malicious index url in comments (CVE-2022-21668)Advisory2022-01-10
AVID-2026-R0940SSRF vulnerability (requires authentication) (CVE-2022-21697)Advisory2022-01-25
AVID-2026-R0941Division by zero in Tensorflow (CVE-2022-21725)Advisory2022-02-03
AVID-2026-R0942Out of bounds read in Tensorflow (CVE-2022-21726)Advisory2022-02-03
AVID-2026-R0943Integer overflow in Tensorflow (CVE-2022-21727)Advisory2022-02-03
AVID-2026-R0944Out of bounds read in Tensorflow (CVE-2022-21728)Advisory2022-02-03
AVID-2026-R0945Overflow and uncaught divide by zero in Tensorflow (CVE-2022-21729)Advisory2022-02-03
AVID-2026-R0946Out of bounds read in Tensorflow (CVE-2022-21730)Advisory2022-02-03
AVID-2026-R0947Type confusion leading to segfault in Tensorflow (CVE-2022-21731)Advisory2022-02-03
AVID-2026-R0948Memory exhaustion in Tensorflow (CVE-2022-21732)Advisory2022-02-03
AVID-2026-R0949Memory exhaustion in Tensorflow (CVE-2022-21733)Advisory2022-02-03
AVID-2026-R0950`CHECK`-failures in Tensorflow (CVE-2022-21734)Advisory2022-02-03
AVID-2026-R0951Undefined behavior in Tensorflow (CVE-2022-21736)Advisory2022-02-03
AVID-2026-R0952Integer overflow leading to crash in Tensorflow (CVE-2022-21738)Advisory2022-02-03
AVID-2026-R0953Null pointer dereference in TensorFlow (CVE-2022-21739)Advisory2022-02-03
AVID-2026-R0954Heap overflow in Tensorflow (CVE-2022-21740)Advisory2022-02-03
AVID-2026-R0955Division by zero in TFLite (CVE-2022-21741)Advisory2022-02-03
AVID-2026-R0956Vulnerability CVE-2022-21820Advisory2022-03-24
AVID-2026-R0957Vulnerability CVE-2022-21821Advisory2022-03-29
AVID-2026-R0958Vulnerability CVE-2022-21822Advisory2022-03-17
AVID-2026-R0959Vulnerability CVE-2022-2185Advisory2022-07-01
AVID-2026-R0960Vulnerability CVE-2022-22965Advisory2022-04-01
AVID-2026-R0961Command Injection (CVE-2022-22984)Advisory2022-11-30
AVID-2026-R0962Arbitrary File Write when Extracting Tarballs retrieved from a remote location using in mindsdb (CVE-2022-23522)Advisory2023-03-30
AVID-2026-R0963jsonwebtoken unrestricted key type could lead to legacy keys usage (CVE-2022-23539)Advisory2022-12-22
AVID-2026-R0964Integer overflow in TFLite (CVE-2022-23559)Advisory2022-02-04
AVID-2026-R0965Read and Write outside of bounds in TFLite (CVE-2022-23560)Advisory2022-02-04
AVID-2026-R0966Integer overflow in Tensorflow (CVE-2022-23562)Advisory2022-02-04
AVID-2026-R0967Insecure temporary file in Tensorflow (CVE-2022-23563)Advisory2022-02-04
AVID-2026-R0968Reachable Assertion in Tensorflow (CVE-2022-23564)Advisory2022-02-04
AVID-2026-R0969Out of bounds write in Tensorflow (CVE-2022-23566)Advisory2022-02-04
AVID-2026-R0970Integer overflows in Tensorflow (CVE-2022-23567)Advisory2022-02-03
AVID-2026-R0971Integer overflows in Tensorflow (CVE-2022-23568)Advisory2022-02-03
AVID-2026-R0972Null-dereference in Tensorflow (CVE-2022-23570)Advisory2022-02-04
AVID-2026-R0973Reachable Assertion in Tensorflow (CVE-2022-23571)Advisory2022-02-04
AVID-2026-R0974Crash when type cannot be specialized in Tensorflow (CVE-2022-23572)Advisory2022-02-04
AVID-2026-R0975Uninitialized variable access in Tensorflow (CVE-2022-23573)Advisory2022-02-04
AVID-2026-R0976Out of bounds read and write in Tensorflow (CVE-2022-23574)Advisory2022-02-04
AVID-2026-R0977Integer overflow in Tensorflow (CVE-2022-23575)Advisory2022-02-04
AVID-2026-R0978Integer overflow in Tensorflow (CVE-2022-23576)Advisory2022-02-04
AVID-2026-R0979Null-dereference in Tensorflow (CVE-2022-23577)Advisory2022-02-04
AVID-2026-R0980Memory leak in Tensorflow (CVE-2022-23578)Advisory2022-02-04
AVID-2026-R0981`CHECK`-failures during Grappler's `SafeToRemoveIdentity` in Tensorflow (CVE-2022-23579)Advisory2022-02-04
AVID-2026-R0982Abort caused by allocating a vector that is too large in Tensorflow (CVE-2022-23580)Advisory2022-02-04
AVID-2026-R0983`CHECK`-failures during Grappler's `IsSimplifiableReshape` in Tensorflow (CVE-2022-23581)Advisory2022-02-04
AVID-2026-R0984`CHECK`-failures in `TensorByteSize` in Tensorflow (CVE-2022-23582)Advisory2022-02-04
AVID-2026-R0985`CHECK`-failures in binary ops in Tensorflow (CVE-2022-23583)Advisory2022-02-04
AVID-2026-R0986Use after free in `DecodePng` in Tensorflow (CVE-2022-23584)Advisory2022-02-04
AVID-2026-R0987Memory leak in decoding PNG images in Tensorflow (CVE-2022-23585)Advisory2022-02-04
AVID-2026-R0988Multiple `CHECK`-fails in `function.cc` in Tensorflow (CVE-2022-23586)Advisory2022-02-04
AVID-2026-R0989Integer overflow in Tensorflow (CVE-2022-23587)Advisory2022-02-04
AVID-2026-R0990Null pointer dereference in Grappler's `IsConstant` in Tensorflow (CVE-2022-23589)Advisory2022-02-04
AVID-2026-R0991Stack overflow in Tensorflow (CVE-2022-23591)Advisory2022-02-04
AVID-2026-R0992Out of bounds read in Tensorflow (CVE-2022-23592)Advisory2022-02-04
AVID-2026-R0993Segfault in `simplifyBroadcast` in Tensorflow (CVE-2022-23593)Advisory2022-02-04
AVID-2026-R0994Out of bounds read in Tensorflow (CVE-2022-23594)Advisory2022-02-04
AVID-2026-R0995Null pointer dereference in TensorFlow (CVE-2022-23595)Advisory2022-02-04
AVID-2026-R0996Vulnerability CVE-2022-2417Advisory2022-08-05
AVID-2026-R0997Apache Pulsar Proxy target broker address isn't validated (CVE-2022-24280)Advisory2022-09-23
AVID-2026-R0998ReDoS in Apache MXNet RTC Module (CVE-2022-24294)Advisory2022-07-24
AVID-2026-R0999Sensitive Auth & Cookie data stored in Jupyter server logs (CVE-2022-24757)Advisory2022-03-23
AVID-2026-R1000Insertion of Sensitive Information into Log File affects Jupyter Notebook (CVE-2022-24758)Advisory2022-03-31
AVID-2026-R1001Improper Neutralization of Formula Elements in a CSV File in Gradio Flagging (CVE-2022-24770)Advisory2022-03-17
AVID-2026-R1002Vulnerability CVE-2022-25201Advisory2022-02-15
AVID-2026-R1003Deserialization of Untrusted Data (CVE-2022-25845)Advisory2022-06-10
AVID-2026-R1004Vulnerability CVE-2022-25864Advisory2023-08-11
AVID-2026-R1005Vulnerability CVE-2022-26076Advisory2023-02-16
AVID-2026-R1006Vulnerability CVE-2022-26425Advisory2023-02-16
AVID-2026-R1007Vulnerability CVE-2022-26526Advisory2022-03-17
AVID-2026-R1008Vulnerability CVE-2022-27199Advisory2022-03-15
AVID-2026-R1009Vulnerability CVE-2022-27234Advisory2023-02-16
AVID-2026-R1010Vulnerability CVE-2022-28199Advisory2022-09-01
AVID-2026-R1011Vulnerability CVE-2022-28696Advisory2022-08-18
AVID-2026-R1012Vulnerability CVE-2022-2884Advisory2022-10-17
AVID-2026-R1013No protection against rollback attacks in go-tuf (CVE-2022-29173)Advisory2022-05-05
AVID-2026-R1014Missing validation causes denial of service via `GetSessionTensor` in TensorFlow (CVE-2022-29191)Advisory2022-05-20
AVID-2026-R1015Missing validation crashes `QuantizeAndDequantizeV4Grad` in TensorFlow (CVE-2022-29192)Advisory2022-05-20
AVID-2026-R1016Missing validation causes `TensorSummaryV2` in TensorFlow to crash (CVE-2022-29193)Advisory2022-05-20
AVID-2026-R1017Missing validation causes denial of service via `DeleteSessionTensor` in TensorFlow (CVE-2022-29194)Advisory2022-05-20
AVID-2026-R1018Missing validation causes denial of service in TensorFlow via `StagePeek` (CVE-2022-29195)Advisory2022-05-20
AVID-2026-R1019Missing validation causes denial of service in TensorFlow via `Conv3DBackpropFilterV2` (CVE-2022-29196)Advisory2022-05-20
AVID-2026-R1020Missing validation causes denial of service in TensorFlow via `UnsortedSegmentJoin` (CVE-2022-29197)Advisory2022-05-20
AVID-2026-R1021Missing validation causes denial of service in TensorFlow via `SparseTensorToCSRSparseMatrix` (CVE-2022-29198)Advisory2022-05-20
AVID-2026-R1022Missing validation causes denial of service in TensorFlow via `LoadAndRemapMatrix` (CVE-2022-29199)Advisory2022-05-20
AVID-2026-R1023Missing validation causes denial of service in TensorFlow via `LSTMBlockCell` (CVE-2022-29200)Advisory2022-05-20
AVID-2026-R1024Missing validation in `QuantizedConv2D` results in undefined behavior in TensorFlow (CVE-2022-29201)Advisory2022-05-20
AVID-2026-R1025Denial of service in TensorFlow due to lack of validation in `tf.ragged.constant` (CVE-2022-29202)Advisory2022-05-20
AVID-2026-R1026Integer overflow in `SpaceToBatchND` in TensorFlow (CVE-2022-29203)Advisory2022-05-20
AVID-2026-R1027Missing validation causes denial of service in TensorFlow via `Conv3DBackpropFilterV2` (CVE-2022-29204)Advisory2022-05-20
AVID-2026-R1028Segfault due to missing support for quantized types in TensorFlow (CVE-2022-29205)Advisory2022-05-20
AVID-2026-R1029Missing validation results in undefined behavior in `SparseTensorDenseAdd` in TensorFlow (CVE-2022-29206)Advisory2022-05-20
AVID-2026-R1030Undefined behavior when users supply invalid resource handles in TensorFlow (CVE-2022-29207)Advisory2022-05-20
AVID-2026-R1031Segfault and Out-of-bounds Write write due to incomplete validation in TensorFlow (CVE-2022-29208)Advisory2022-05-20
AVID-2026-R1032Type confusion leading to `CHECK`-failure based denial of service in TensorFlow (CVE-2022-29209)Advisory2022-05-20
AVID-2026-R1033Heap buffer overflow due to incorrect hash function in TensorFlow (CVE-2022-29210)Advisory2022-05-20
AVID-2026-R1034Segfault in TensorFlow if `tf.histogram_fixed_width` is called with NaN values (CVE-2022-29211)Advisory2022-05-20
AVID-2026-R1035Core dump when loading TFLite models with quantization in TensorFlow (CVE-2022-29212)Advisory2022-05-20
AVID-2026-R1036Incomplete validation in signal ops leads to crashes in TensorFlow (CVE-2022-29213)Advisory2022-05-20
AVID-2026-R1037Code injection in `saved_model_cli` in TensorFlow (CVE-2022-29216)Advisory2022-05-20
AVID-2026-R1038Key confusion through non-blocklisted public key formats in PyJWT (CVE-2022-29217)Advisory2022-05-24
AVID-2026-R1039Forced Browsing in Jupyter Notebook (CVE-2022-29238)Advisory2022-06-14
AVID-2026-R1040TIBCO Statistica Reflected Cross Site Scripting (XSS) Vulnerability (CVE-2022-30575)Advisory2022-08-16
AVID-2026-R1041Vulnerability CVE-2022-30882Advisory2022-06-08
AVID-2026-R1042Server-Side Request Forgery Vulnerability in Computer Vision Annotation Tool (CVAT) (CVE-2022-31188)Advisory2022-08-01
AVID-2026-R1043Vulnerability CVE-2022-31523Advisory2022-07-11
AVID-2026-R1044Vulnerability CVE-2022-31616Advisory2022-11-18
AVID-2026-R1045Puppetlabs-mysql Command Injection (CVE-2022-3276)Advisory2022-10-07
AVID-2026-R1046Vulnerability CVE-2022-32997Advisory2022-06-24
AVID-2026-R1047Vulnerability CVE-2022-33002Advisory2022-06-24
AVID-2026-R1048Improper authentication in Qualcomm IPC (CVE-2022-33242)Advisory2023-03-07
AVID-2026-R1049Apache Pulsar C++/Python OAuth Clients prior to 3.0.0 were vulnerable to an MITM attack due to Disabled Certificate Validation (CVE-2022-33684)Advisory2022-11-04
AVID-2026-R1050Apache Spark shell command injection vulnerability via Spark UI (CVE-2022-33891)Advisory2022-07-18
AVID-2026-R1051Vulnerability CVE-2022-34061Advisory2022-06-24
AVID-2026-R1052Apache Pulsar: Improper Authentication for Pulsar Proxy Statistics Endpoint (CVE-2022-34321)Advisory2024-03-12
AVID-2026-R1053Vulnerability CVE-2022-34665Advisory2022-11-18
AVID-2026-R1054Vulnerability CVE-2022-34667Advisory2022-11-18
AVID-2026-R1055Vulnerability CVE-2022-34668Advisory2022-08-29
AVID-2026-R1056Vulnerability CVE-2022-34676Advisory2022-12-30
AVID-2026-R1057Vulnerability CVE-2022-34982Advisory2022-07-22
AVID-2026-R1058Streamlit directory traversal vulnerability (CVE-2022-35918)Advisory2022-08-01
AVID-2026-R1059False positive signature verification in cosign (CVE-2022-35929)Advisory2022-08-04
AVID-2026-R1060`CHECK` failure in tf.reshape in Tensorflow (CVE-2022-35934)Advisory2022-09-16
AVID-2026-R1061`CHECK` failure in `SobolSample` via missing validation in TensorFlow (CVE-2022-35935)Advisory2022-09-16
AVID-2026-R1062OOB read in `Gather_nd` op in TensorFlow Lite (CVE-2022-35937)Advisory2022-09-16
AVID-2026-R1063OOB read in `Gather_nd` op in TensorFlow Lite Micro (CVE-2022-35938)Advisory2022-09-16
AVID-2026-R1064Out of bounds write in `scatter_nd` op in TensorFlow Lite (CVE-2022-35939)Advisory2022-09-16
AVID-2026-R1065Int overflow in `RaggedRangeOp` in Tensoflow (CVE-2022-35940)Advisory2022-09-16
AVID-2026-R1066`CHECK` failure in `AvgPoolOp` in Tensorflow (CVE-2022-35941)Advisory2022-09-16
AVID-2026-R1067`CHECK` failures in `UnbatchGradOp` in TensorFlow (CVE-2022-35952)Advisory2022-09-16
AVID-2026-R1068`CHECK` failures in `AvgPool3DGrad` in TensorFlow (CVE-2022-35959)Advisory2022-09-16
AVID-2026-R1069`CHECK` failure in `TensorListReserve` in TensorFlow (CVE-2022-35960)Advisory2022-09-16
AVID-2026-R1070`CHECK` failures in `FractionalAvgPoolGrad` in TensorFlow (CVE-2022-35963)Advisory2022-09-16
AVID-2026-R1071Segfault in `BlockLSTMGradV2` in TensorFlow (CVE-2022-35964)Advisory2022-09-16
AVID-2026-R1072Segfault in `LowerBound` and `UpperBound` in TensorFlow (CVE-2022-35965)Advisory2022-09-16
AVID-2026-R1073Segfault in `QuantizedAvgPool` in TensorFlow (CVE-2022-35966)Advisory2022-09-16
AVID-2026-R1074Segfault in `QuantizedAdd` in TensorFlow (CVE-2022-35967)Advisory2022-09-16
AVID-2026-R1075`CHECK` fail in `AvgPoolGrad` in TensorFlow (CVE-2022-35968)Advisory2022-09-16
AVID-2026-R1076`CHECK` fail in `Conv2DBackpropInput` in TensorFlow (CVE-2022-35969)Advisory2022-09-16
AVID-2026-R1077Segfault in `QuantizedInstanceNorm` in TensorFlow (CVE-2022-35970)Advisory2022-09-16
AVID-2026-R1078`CHECK` fail in `FakeQuantWithMinMaxVars` in TensorFlow (CVE-2022-35971)Advisory2022-09-16
AVID-2026-R1079Segfault in `QuantizedBiasAdd` in TensorFlow (CVE-2022-35972)Advisory2022-09-16
AVID-2026-R1080Segfault in `QuantizedMatMul` in TensorFlow (CVE-2022-35973)Advisory2022-09-16
AVID-2026-R1081Segfault in `QuantizedRelu` and `QuantizedRelu6` (CVE-2022-35979)Advisory2022-09-16
AVID-2026-R1082`CHECK` fail in `FractionalMaxPoolGrad` in TensorFlow (CVE-2022-35981)Advisory2022-09-16
AVID-2026-R1083Segfault in `SparseBincount` in TensorFlow (CVE-2022-35982)Advisory2022-09-16
AVID-2026-R1084`CHECK` fail in `Save` and `SaveSlices` in TensorFlow (CVE-2022-35983)Advisory2022-09-16
AVID-2026-R1085`CHECK` fail in `ParameterizedTruncatedNormal` in TensorFlow (CVE-2022-35984)Advisory2022-09-16
AVID-2026-R1086`CHECK` fail in `LRNGrad` in TensorFlow (CVE-2022-35985)Advisory2022-09-16
AVID-2026-R1087Segfault in `RaggedBincount` in TensorFlow (CVE-2022-35986)Advisory2022-09-16
AVID-2026-R1088`CHECK` fail in `DenseBincount` in TensorFlow (CVE-2022-35987)Advisory2022-09-16
AVID-2026-R1089`CHECK` fail in `MaxPool` in TensorFlow (CVE-2022-35989)Advisory2022-09-16
AVID-2026-R1090`CHECK` fail in `FakeQuantWithMinMaxVarsPerChannelGradient` in TensorFlow (CVE-2022-35990)Advisory2022-09-16
AVID-2026-R1091`CHECK` fail in `TensorListScatter` and `TensorListScatterV2` in TensorFlow (CVE-2022-35991)Advisory2022-09-16
AVID-2026-R1092`CHECK` fail in `TensorListFromTensor` in TensorFlow (CVE-2022-35992)Advisory2022-09-16
AVID-2026-R1093`CHECK` fail in `CollectiveGather` in TensorFlow (CVE-2022-35994)Advisory2022-09-16
AVID-2026-R1094`CHECK` fail in `AudioSummaryV2` in TensorFlow (CVE-2022-35995)Advisory2022-09-16
AVID-2026-R1095Floating point exception in `Conv2D` in TensorFlow (CVE-2022-35996)Advisory2022-09-16
AVID-2026-R1096`CHECK` fail in `tf.sparse.cross` in TensorFlow (CVE-2022-35997)Advisory2022-09-16
AVID-2026-R1097`CHECK` fail in `EmptyTensorList` in TensorFlow (CVE-2022-35998)Advisory2022-09-16
AVID-2026-R1098`CHECK` fail in `Conv2DBackpropInput` in TensorFlow (CVE-2022-35999)Advisory2022-09-16
AVID-2026-R1099Null dereference on MLIR on empty function attributes in TensorFlow (CVE-2022-36000)Advisory2022-09-16
AVID-2026-R1100`CHECK` fail in `DrawBoundingBoxes` in TensorFlow (CVE-2022-36001)Advisory2022-09-16
AVID-2026-R1101`CHECK` fail in `Unbatch` in TensorFlow (CVE-2022-36002)Advisory2022-09-16
AVID-2026-R1102`CHECK` fail in `RandomPoissonV2` in TensorFlow (CVE-2022-36003)Advisory2022-09-16
AVID-2026-R1103`CHECK` fail in `tf.random.gamma` in TensorFlow (CVE-2022-36004)Advisory2022-09-16
AVID-2026-R1104`CHECK` fail in `FakeQuantWithMinMaxVarsGradient` in TensorFlow (CVE-2022-36005)Advisory2022-09-16
AVID-2026-R1105Null dereference on MLIR on empty function attributes in TensorFlow (CVE-2022-36011)Advisory2022-09-16
AVID-2026-R1106Assertion fail on MLIR empty edge names in TensorFlow (CVE-2022-36012)Advisory2022-09-16
AVID-2026-R1107Null-dereference in `mlir::tfg::GraphDefImporter::ConvertNodeDef` in TensorFlow (CVE-2022-36013)Advisory2022-09-16
AVID-2026-R1108Null-dereference in `mlir::tfg::TFOp::nameAttr` in TensorFlow (CVE-2022-36014)Advisory2022-09-16
AVID-2026-R1109Integer overflow in math ops in TensorFlow (CVE-2022-36015)Advisory2022-09-16
AVID-2026-R1110`CHECK`-fail in `tensorflow::full_type::SubstituteFromAttrs` in TensorFlow (CVE-2022-36016)Advisory2022-09-16
AVID-2026-R1111Segfault in `Requantize` in TensorFlow (CVE-2022-36017)Advisory2022-09-16
AVID-2026-R1112`CHECK` fail in `FakeQuantWithMinMaxVarsPerChannel` in TensorFlow (CVE-2022-36019)Advisory2022-09-16
AVID-2026-R1113Some Deeplearning4J packages use unclaimed s3 bucket in tests and examples (CVE-2022-36022)Advisory2022-11-10
AVID-2026-R1114Segfault TFLite converter on per-channel quantized transposed convolutions in TensorFlow (CVE-2022-36027)Advisory2022-09-16
AVID-2026-R1115Vulnerabilities with blob verification in sigstore cosign (CVE-2022-36056)Advisory2022-09-14
AVID-2026-R1116Extracting malicious crates can fill the file system (CVE-2022-36114)Advisory2022-09-14
AVID-2026-R1117Apache Calcite Avatica JDBC driver `httpclient_impl` connection property can be used as an RCE vector (CVE-2022-36364)Advisory2022-07-28
AVID-2026-R1118IBM Cloud Pak for Data file upload (CVE-2022-36769)Advisory2023-04-26
AVID-2026-R1119Docker Provider <3.0 RCE vulnerability in example dag (CVE-2022-38362)Advisory2022-08-16
AVID-2026-R1120Apache Airflow Pinot provider allowed Command Injection (CVE-2022-38649)Advisory2022-11-22
AVID-2026-R1121Vulnerability CVE-2022-38881Advisory2022-09-19
AVID-2026-R1122Python-jwt subject to Authentication Bypass by Spoofing (CVE-2022-39227)Advisory2022-09-23
AVID-2026-R1123Execution with Unnecessary Privileges in JupyterApp (CVE-2022-39286)Advisory2022-10-26
AVID-2026-R1124Dependency-Track vulnerable to logging of API keys in clear text when handling API requests using keys with insufficient permissions (CVE-2022-39351)Advisory2022-10-25
AVID-2026-R1125Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration) (CVE-2022-39379)Advisory2022-11-02
AVID-2026-R1126Apache Airlfow Pig Provider RCE (CVE-2022-40189)Advisory2022-11-22
AVID-2026-R1127Vulnerability CVE-2022-40432Advisory2022-09-19
AVID-2026-R1128Vulnerability CVE-2022-40808Advisory2022-09-19
AVID-2026-R1129Vulnerability CVE-2022-40811Advisory2022-09-19
AVID-2026-R1130Apache Airflow Spark Provider RCE that bypass restrictions to read arbitrary files (CVE-2022-40954)Advisory2022-11-22
AVID-2026-R1131Vulnerability CVE-2022-41237Advisory2022-09-21
AVID-2026-R1132IBM Watson Knowledge Catalog on Cloud Pak SQL injection (CVE-2022-41731)Advisory2023-02-06
AVID-2026-R1133ThreadUnsafeUnigramCandidateSampler Heap out of bounds in Tensorflow (CVE-2022-41880)Advisory2022-11-18
AVID-2026-R1134Out of bounds segmentation fault due to unequal op inputs in Tensorflow (CVE-2022-41883)Advisory2022-11-18
AVID-2026-R1135Seg fault in `ndarray_tensor_bridge` due to zero and large inputs in Tensorflow (CVE-2022-41884)Advisory2022-11-18
AVID-2026-R1136Overflow in `FusedResizeAndPadConv2D` in Tensorflow (CVE-2022-41885)Advisory2022-11-18
AVID-2026-R1137Overflow in `ImageProjectiveTransformV2` in Tensorflow (CVE-2022-41886)Advisory2022-11-18
AVID-2026-R1138Overflow in `tf.keras.losses.poisson` in Tensorflow (CVE-2022-41887)Advisory2022-11-18
AVID-2026-R1139Unckecked rank size in `tf.image.generate_bounding_box_proposals` in Tensorflow (CVE-2022-41888)Advisory2022-11-18
AVID-2026-R1140Segfault via invalid attributes in `pywrap_tfe_src.cc` in Tensorflow (CVE-2022-41889)Advisory2022-11-18
AVID-2026-R1141`CHECK` fail in `BCast` overflow in Tensorflow (CVE-2022-41890)Advisory2022-11-18
AVID-2026-R1142Segfault in `tf.raw_ops.TensorListConcat` in Tensorflow (CVE-2022-41891)Advisory2022-11-18
AVID-2026-R1143`CHECK_EQ` fail in `tf.raw_ops.TensorListResize` in Tensorflow (CVE-2022-41893)Advisory2022-11-18
AVID-2026-R1144Buffer overflow in `CONV_3D_TRANSPOSE` on TFLite (CVE-2022-41894)Advisory2022-11-18
AVID-2026-R1145`MirrorPadGrad` heap out of bounds read in Tensorflow (CVE-2022-41895)Advisory2022-11-18
AVID-2026-R1146`tf.raw_ops.Mfcc` crashes in Tensorflow (CVE-2022-41896)Advisory2022-11-18
AVID-2026-R1147`FractionalMaxPoolGrad` Heap out of bounds read in Tensorflow (CVE-2022-41897)Advisory2022-11-18
AVID-2026-R1148`CHECK` fail via inputs in `SparseFillEmptyRowsGrad` in Tensorflow (CVE-2022-41898)Advisory2022-11-18
AVID-2026-R1149`CHECK` fail via inputs in `SdcaOptimizer` in Tensorflow (CVE-2022-41899)Advisory2022-11-18
AVID-2026-R1150FractionalMaxPool and FractionalAVGPool heap out-of-bounds acess in Tensorflow (CVE-2022-41900)Advisory2022-11-18
AVID-2026-R1151`CHECK_EQ` fail via input in `SparseMatrixNNZ` in Tensorflow (CVE-2022-41901)Advisory2022-11-18
AVID-2026-R1152Out of bounds write in grappler in Tensorflow (CVE-2022-41902)Advisory2022-12-06
AVID-2026-R1153Overflow in `ResizeNearestNeighborGrad` in Tensorflow (CVE-2022-41907)Advisory2022-11-18
AVID-2026-R1154`CHECK` fail via inputs in `PyFunc` in Tensorflow (CVE-2022-41908)Advisory2022-11-18
AVID-2026-R1155Segfault in `CompositeTensorVariantToComponents` in Tensorflow (CVE-2022-41909)Advisory2022-11-18
AVID-2026-R1156Heap out of bounds read in `QuantizeAndDequantizeV2` in Tensorflow (CVE-2022-41910)Advisory2022-12-06
AVID-2026-R1157Invalid char to bool conversion when printing a tensor in Tensorflow (CVE-2022-41911)Advisory2022-11-18
AVID-2026-R1158Vulnerability CVE-2022-42036Advisory2022-10-11
AVID-2026-R1159Vulnerability CVE-2022-42037Advisory2022-10-11
AVID-2026-R1160Vulnerability CVE-2022-42039Advisory2022-10-11
AVID-2026-R1161Vulnerability CVE-2022-42041Advisory2022-10-11
AVID-2026-R1162Vulnerability CVE-2022-42042Advisory2022-10-11
AVID-2026-R1163Vulnerability CVE-2022-42044Advisory2022-10-11
AVID-2026-R1164Vulnerability CVE-2022-42261Advisory2022-12-30
AVID-2026-R1165Vulnerability CVE-2022-44054Advisory2022-11-07
AVID-2026-R1166Vulnerability CVE-2022-45907Advisory2022-11-26
AVID-2026-R1167Vulnerability CVE-2022-45908Advisory2022-11-26
AVID-2026-R1168Apache Airflow Hive Provider: Hive Provider RCE vulnerability with hive_cli_params (CVE-2022-46421)Advisory2022-12-20
AVID-2026-R1169Apache Airflow: Security vulnerability on AirFlow Connections (CVE-2022-46651)Advisory2023-07-12
AVID-2026-R1170Vulnerability CVE-2022-46741Advisory2022-12-07
AVID-2026-R1171Vulnerability CVE-2022-46742Advisory2022-12-07
AVID-2026-R1172Deserializing compromised object with MongoDB .NET/C# Driver may cause remote code execution (CVE-2022-48282)Advisory2023-02-21
AVID-2026-R1173Vulnerability CVE-2023-0189Advisory2023-04-01
AVID-2026-R1174Vulnerability CVE-2023-0193Advisory2023-03-02
AVID-2026-R1175Vulnerability CVE-2023-0196Advisory2023-03-02
AVID-2026-R1176Absolute Path Traversal in mlflow/mlflow (CVE-2023-1176)Advisory2023-03-24
AVID-2026-R1177ChatBot < 4.4.9 - Subscriber+ OpenAI Settings Update to Stored XSS (CVE-2023-1651)Advisory2023-05-08
AVID-2026-R1178Vulnerability CVE-2023-22355Advisory2023-05-10
AVID-2026-R1179Apache Jena: Exposure of arbitrary execution in script engine expressions. (CVE-2023-22665)Advisory2023-04-25
AVID-2026-R1180Apache Airflow JDBC Provider: RCE Vulnerability (CVE-2023-22886)Advisory2023-06-29
AVID-2026-R1181Azure Machine Learning Compute Instance Information Disclosure Vulnerability (CVE-2023-23382)Advisory2023-02-14
AVID-2026-R1182Relative Path Traversal in mlflow/mlflow (CVE-2023-2356)Advisory2023-04-28
AVID-2026-R1183vantage6's Pickle serialization is insecure (CVE-2023-23930)Advisory2023-10-11
AVID-2026-R1184Vulnerability CVE-2023-25510Advisory2023-04-22
AVID-2026-R1185Vulnerability CVE-2023-25511Advisory2023-04-22
AVID-2026-R1186Vulnerability CVE-2023-25512Advisory2023-04-22
AVID-2026-R1187Vulnerability CVE-2023-25513Advisory2023-04-22
AVID-2026-R1188Vulnerability CVE-2023-25514Advisory2023-04-22
AVID-2026-R1189Vulnerability CVE-2023-25517Advisory2023-07-03
AVID-2026-R1190Vulnerability CVE-2023-25523Advisory2023-07-03
AVID-2026-R1191JupyterHub's LTI13Authenticator: JWT signature not validated (CVE-2023-25574)Advisory2025-02-25
AVID-2026-R1192TensorFlow vulnerable to Out-of-Bounds Read in GRUBlockCellGrad (CVE-2023-25658)Advisory2023-03-24
AVID-2026-R1193TensorFlow vulnerable to Out-of-Bounds Read in DynamicStitch (CVE-2023-25659)Advisory2023-03-24
AVID-2026-R1194TensorFlow vulnerable to seg fault in `tf.raw_ops.Print` (CVE-2023-25660)Advisory2023-03-24
AVID-2026-R1195TensorFlow vulnerable to integer overflow in EditDistance (CVE-2023-25662)Advisory2023-03-24
AVID-2026-R1196TensorFlow has Null Pointer Error in TensorArrayConcatV2 (CVE-2023-25663)Advisory2023-03-24
AVID-2026-R1197TensorFlow vulnerable to Heap Buffer Overflow in AvgPoolGrad (CVE-2023-25664)Advisory2023-03-24
AVID-2026-R1198TensorFlow has Floating Point Exception in AudioSpectrogram (CVE-2023-25666)Advisory2023-03-24
AVID-2026-R1199TensorFlow vulnerable to segfault when opening multiframe gif (CVE-2023-25667)Advisory2023-03-24
AVID-2026-R1200TensorFlow vulnerable to heap out-of-buffer read in the QuantizeAndDequantize operation (CVE-2023-25668)Advisory2023-03-24
AVID-2026-R1201TensorFlow has Floating Point Exception in AvgPoolGrad with XLA (CVE-2023-25669)Advisory2023-03-24
AVID-2026-R1202TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize (CVE-2023-25670)Advisory2023-03-24
AVID-2026-R1203TensorFlow has segmentation fault in tfg-translate (CVE-2023-25671)Advisory2023-03-24
AVID-2026-R1204TensorFlow has Null Pointer Error in LookupTableImportV2 (CVE-2023-25672)Advisory2023-03-24
AVID-2026-R1205TensorFlow has Floating Point Exception in TensorListSplit with XLA (CVE-2023-25673)Advisory2023-03-24
AVID-2026-R1206TensorFlow has Null Pointer Error in RandomShuffle with XLA enable (CVE-2023-25674)Advisory2023-03-24
AVID-2026-R1207TensorFlow has Segfault in Bincount with XLA (CVE-2023-25675)Advisory2023-03-24
AVID-2026-R1208TensorFlow has null dereference on ParallelConcat with XLA (CVE-2023-25676)Advisory2023-03-24
AVID-2026-R1209Apache Airflow Google Provider: Google Cloud Sql Provider Remote Command Execution (CVE-2023-25691)Advisory2023-02-24
AVID-2026-R1210Sqoop Apache Airflow Provider Remote Code Execution Vulnerability (CVE-2023-25693)Advisory2023-02-24
AVID-2026-R1211Information disclosure in Apache Airflow (CVE-2023-25695)Advisory2023-03-15
AVID-2026-R1212AI-Engine < 1.6.83 - Admin+ Stored XSS (CVE-2023-2580)Advisory2023-06-27
AVID-2026-R1213TensorFlow has double free in Fractional(Max/Avg)Pool (CVE-2023-25801)Advisory2023-03-24
AVID-2026-R1214ReportPortal DoS vulnerability on creating a Launch with too many recursively nested elements (CVE-2023-25822)Advisory2023-10-09
AVID-2026-R1215Gradio contains Use of Hard-coded Credentials (CVE-2023-25823)Advisory2023-02-23
AVID-2026-R1216Apache Airflow AWS Provider: Arbitrary file read via AWS provider (CVE-2023-25956)Advisory2023-02-24
AVID-2026-R1217OpenCV wechat_qrcode Module decoded_bit_stream_parser.cpp decodeHanziSegment memory leak (CVE-2023-2618)Advisory2023-05-10
AVID-2026-R1218Vulnerability CVE-2023-26263Advisory2023-04-13
AVID-2026-R1219IBM Watson CP4D Data Stores file modificiation (CVE-2023-26282)Advisory2024-03-05
AVID-2026-R1220Apache EventMesh RabbitMQ-Connector plugin allows RCE through deserialization of untrusted data (CVE-2023-26512)Advisory2023-07-17
AVID-2026-R1221IBM Watson CP4D Data Stores information disclosure (CVE-2023-27291)Advisory2024-03-03
AVID-2026-R1222Vulnerability CVE-2023-27506Advisory2023-08-11
AVID-2026-R1223IBM Watson CP4D Data Stores denial of service (CVE-2023-27540)Advisory2023-07-10
AVID-2026-R1224IBM Watson CloudPak for Data Data Stores information disclosure (CVE-2023-27545)Advisory2024-02-29
AVID-2026-R1225TensorFlow has Floating Point Exception in TFLite in conv kernel (CVE-2023-27579)Advisory2023-03-24
AVID-2026-R1226Apache Airflow Sqoop Provider: Airflow Sqoop Provider RCE Vulnerability (CVE-2023-27604)Advisory2023-08-28
AVID-2026-R1227Insecure Temporary File in huggingface/transformers (CVE-2023-2800)Advisory2023-05-18
AVID-2026-R1228Vulnerability CVE-2023-28380Advisory2023-08-11
AVID-2026-R1229Vulnerability CVE-2023-28405Advisory2023-08-11
AVID-2026-R1230IBM Watson CP4D Data Stores improper input validation (CVE-2023-28512)Advisory2024-03-03
AVID-2026-R1231Apache Airflow Hive Provider Beeline Remote Command Execution (CVE-2023-28706)Advisory2023-04-07
AVID-2026-R1232Apache Airflow Spark Provider Arbitrary File Read via JDBC (CVE-2023-28710)Advisory2023-04-07
AVID-2026-R1233Apache Linkis DatasourceManager module has a deserialization command execution (CVE-2023-29216)Advisory2023-04-10
AVID-2026-R1234MindSpore json_helper.cc UpdateArray memory corruption (CVE-2023-2970)Advisory2023-05-30
AVID-2026-R1235Vulnerability CVE-2023-30172Advisory2023-05-11
AVID-2026-R1236IBM Watson Machine Learning on Cloud Pak for Data server-side request forgery (CVE-2023-30444)Advisory2023-04-27
AVID-2026-R1237Arbitrary File Write when Extracting a Remotely retrieved Tarball in mindsdb/mindsdb (CVE-2023-30620)Advisory2023-04-21
AVID-2026-R1238Vulnerability CVE-2023-30767Advisory2024-02-14
AVID-2026-R1239CVE (CVE-2023-31036)Advisory2024-01-12
AVID-2026-R1240in-toto vulnerable to Configuration Read From Local Directory (CVE-2023-32076)Advisory2023-05-10
AVID-2026-R1241Planet's secret file is created with excessive permissions (CVE-2023-32303)Advisory2023-05-12
AVID-2026-R1242Sqlite-jdbc vulnerable to remote code execution when JDBC url is attacker controlled (CVE-2023-32697)Advisory2023-05-23
AVID-2026-R1243malformed proposed intoto v0.0.2 entries can cause a panic in Rekor (CVE-2023-33199)Advisory2023-05-26
AVID-2026-R1244S3 credentials included when exporting elyra notebook (CVE-2023-3361)Advisory2023-10-04
AVID-2026-R1245TensorFlow segfault in array_ops.upper_bound (CVE-2023-33976)Advisory2024-07-30
AVID-2026-R1246Java Deserialization vulnerability in Spring-Kafka When Improperly Configured (CVE-2023-34040)Advisory2023-08-24
AVID-2026-R1247Snowflake Python Connector vulnerable to Command Injection (CVE-2023-34233)Advisory2023-06-08
AVID-2026-R1248Apache Airflow ODBC Provider: Remote code execution vulnerability (CVE-2023-34395)Advisory2023-06-27
AVID-2026-R1249Apache Airflow Hive Provider Beeline RCE with Principal (CVE-2023-35797)Advisory2023-07-03
AVID-2026-R1250Dependency cache path traversal in Gradle (CVE-2023-35946)Advisory2023-06-30
AVID-2026-R1251Visual Studio Code Jupyter Extension Spoofing Vulnerability (CVE-2023-36018)Advisory2023-11-14
AVID-2026-R1252Vulnerability CVE-2023-36189Advisory2023-07-06
AVID-2026-R1253Vulnerability CVE-2023-36281Advisory2023-08-22
AVID-2026-R1254Azure Identity SDK Remote Code Execution Vulnerability (CVE-2023-36414)Advisory2023-10-10
AVID-2026-R1255AWS data.all vulnerable to RCE through user injection of Python Commands (CVE-2023-36467)Advisory2023-06-28
AVID-2026-R1256Apache Airflow: Exposure of sensitive connection information, DOS and SSRF on "test connection" feature (CVE-2023-37379)Advisory2023-08-23
AVID-2026-R1257Apache Pulsar Function Worker: Incorrect Authorization for Function Worker Can Leak Sink/Source Credentials (CVE-2023-37579)Advisory2023-07-12
AVID-2026-R1258Absolute Path Traversal in mlflow/mlflow (CVE-2023-3765)Advisory2023-07-19
AVID-2026-R1259Vulnerability CVE-2023-38669Advisory2023-07-26
AVID-2026-R1260Null pointer dereference in paddle.flip (CVE-2023-38670)Advisory2023-07-26
AVID-2026-R1261Heap buffer overflow in paddle.trace (CVE-2023-38671)Advisory2023-07-26
AVID-2026-R1262FPE in paddle.nanmedian (CVE-2023-38674)Advisory2024-01-03
AVID-2026-R1263FPE in paddle.linalg.matrix_rank (CVE-2023-38675)Advisory2024-01-03
AVID-2026-R1264Segfault in paddle.dot (CVE-2023-38676)Advisory2024-01-03
AVID-2026-R1265FPE in paddle.linalg.eig (CVE-2023-38677)Advisory2024-01-03
AVID-2026-R1266MindsDB 'Call to requests with verify=False disabling SSL certificate checks, security issue.' issue (CVE-2023-38699)Advisory2023-08-04
AVID-2026-R1267Vulnerability CVE-2023-38976Advisory2023-08-21
AVID-2026-R1268Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK (CVE-2023-39410)Advisory2023-09-29
AVID-2026-R1269Vulnerability CVE-2023-39659Advisory2023-08-15
AVID-2026-R1270Vulnerability CVE-2023-39660Advisory2023-08-21
AVID-2026-R1271Vulnerability CVE-2023-39662Advisory2023-08-15
AVID-2026-R1272Open Redirect Vulnerability in jupyter-server (CVE-2023-39968)Advisory2023-08-28
AVID-2026-R1273Apache Airflow Spark Provider Deserialization Vulnerability RCE (CVE-2023-40195)Advisory2023-08-28
AVID-2026-R1274Apache Airflow Spark Provider Arbitrary File Read via JDBC (CVE-2023-40272)Advisory2023-08-17
AVID-2026-R1275OS Command Injection in mlflow/mlflow (CVE-2023-4033)Advisory2023-08-01
AVID-2026-R1276IBM Watson CP4D Data Stores information disclosure (CVE-2023-40694)Advisory2024-05-07
AVID-2026-R1277Remote Code Execution in Custom Integration Upload in Fides (CVE-2023-41319)Advisory2023-09-06
AVID-2026-R1278Vulnerability CVE-2023-41626Advisory2023-09-15
AVID-2026-R1279Apache Airflow: Improper access control to DAG resources (CVE-2023-42792)Advisory2023-10-14
AVID-2026-R1280TorchServe Server-Side Request Forgery (CVE-2023-43654)Advisory2023-09-28
AVID-2026-R1281Trojan Lockfilein pdm (CVE-2023-45805)Advisory2023-10-20
AVID-2026-R1282D-Tale vulnerable to Remote Code Execution through the Custom Filter Input (CVE-2023-46134)Advisory2023-10-25
AVID-2026-R1283Vulnerability CVE-2023-46229Advisory2023-10-19
AVID-2026-R1284Apache Submarine: Fix CVE-2022-1471 SnakeYaml unsafe deserialization (CVE-2023-46302)Advisory2023-11-20
AVID-2026-R1285Vulnerability CVE-2023-46492Advisory2023-11-09
AVID-2026-R1286Elasticsearch-hadoop Unsafe Deserialization (CVE-2023-46674)Advisory2023-12-05
AVID-2026-R1287Apache Airflow missing fix for CVE-2023-40611 in 2.7.1 (DAG run broken access) (CVE-2023-47037)Advisory2023-11-12
AVID-2026-R1288Object Relational Mapper Leak Vulnerability in Filtering Task in Label Studio (CVE-2023-47117)Advisory2023-11-13
AVID-2026-R1289PyArrow, PyArrow: Arbitrary code execution when loading a malicious data file (CVE-2023-47248)Advisory2023-11-09
AVID-2026-R1290Inconsistent interpretation of `Content-Length` vs. `Transfer-Encoding` in aiohttp (CVE-2023-47641)Advisory2023-11-14
AVID-2026-R1291Vulnerability CVE-2023-48022Advisory2023-11-28
AVID-2026-R1292Vulnerability CVE-2023-48023Advisory2023-11-28
AVID-2026-R1293Apache Airflow: Improper access control to DAG resources (CVE-2023-48291)Advisory2023-12-21
AVID-2026-R1294TorchServe ZipSlip (CVE-2023-48299)Advisory2023-11-21
AVID-2026-R1295Authentication Bypass by Primary Weakness in mintplex-labs/anything-llm (CVE-2023-4898)Advisory2023-09-11
AVID-2026-R1296SQL Injection in mintplex-labs/anything-llm (CVE-2023-4899)Advisory2023-09-11
AVID-2026-R1297Unsafe YAML deserialization in PyDrive2 (CVE-2023-49297)Advisory2023-12-05
AVID-2026-R1298MindsDB Server-Side Request Forgery vulnerability (CVE-2023-49795)Advisory2023-12-11
AVID-2026-R1299MindsDB Arbitrary File Write vulnerability (CVE-2023-49796)Advisory2023-12-11
AVID-2026-R1300Vulnerability CVE-2023-50447Advisory2024-01-19
AVID-2026-R1301MindsDB has arbitrary file write in file.py (CVE-2023-50731)Advisory2023-12-22
AVID-2026-R1302WordPress AI Engine plugin <= 1.9.98 - Unauthenticated Arbitrary File Upload vulnerability (CVE-2023-51409)Advisory2024-04-12
AVID-2026-R1303Apache Pulsar: Timing attack in SASL token signature verification (CVE-2023-51437)Advisory2024-02-07
AVID-2026-R1304Make the `/file` secure against file traversal attacks (CVE-2023-51449)Advisory2023-12-22
AVID-2026-R1305Segfault in paddle.nextafter (CVE-2023-52302)Advisory2024-01-03
AVID-2026-R1306Segfault in paddle.put_along_axis (CVE-2023-52303)Advisory2024-01-03
AVID-2026-R1307Stack overflow in paddle.searchsorted (CVE-2023-52304)Advisory2024-01-03
AVID-2026-R1308FPE in paddle.topk (CVE-2023-52305)Advisory2024-01-03
AVID-2026-R1309FPE in paddle.lerp (CVE-2023-52306)Advisory2024-01-03
AVID-2026-R1310Stack overflow in paddle.linalg.lu_unpack (CVE-2023-52307)Advisory2024-01-03
AVID-2026-R1311FPE in paddle.amin (CVE-2023-52308)Advisory2024-01-03
AVID-2026-R1312Heap buffer overflow in paddle.repeat_interleave (CVE-2023-52309)Advisory2024-01-03
AVID-2026-R1313Command injection in get_online_pass_interval (CVE-2023-52310)Advisory2024-01-03
AVID-2026-R1314Command injection in _wget_download (CVE-2023-52311)Advisory2024-01-03
AVID-2026-R1315Null pointer dereference in paddle.crop (CVE-2023-52312)Advisory2024-01-03
AVID-2026-R1316FPE in paddle.argmin and paddle.argmax (CVE-2023-52313)Advisory2024-01-03
AVID-2026-R1317Command injection in convert_shape_compare (CVE-2023-52314)Advisory2024-01-03
AVID-2026-R1318Vulnerability CVE-2023-5241Advisory2023-10-19
AVID-2026-R1319Using MLeap for loading a saved model (zip archive) can lead to path traversal/arbitrary file creation and possibly remote code execution. (CVE-2023-5245)Advisory2023-11-15
AVID-2026-R1320Vulnerability CVE-2023-5534Advisory2023-10-20
AVID-2026-R1321H2O Local File Include (CVE-2023-6013)Advisory2023-11-16
AVID-2026-R1322H2O Remote Code Execution via POJO Model Import (CVE-2023-6016)Advisory2023-11-16
AVID-2026-R1323MLflow Arbitrary File Write (CVE-2023-6018)Advisory2023-11-16
AVID-2026-R1324Ray Command Injection in cpu_profile Parameter (CVE-2023-6019)Advisory2023-11-16
AVID-2026-R1325Ray Log File Local File Include (CVE-2023-6021)Advisory2023-11-16
AVID-2026-R1326Cross-Site Request Forgery (CSRF) in prefecthq/prefect (CVE-2023-6022)Advisory2023-11-16
AVID-2026-R1327Reflected XSS via Content-Type Header in mlflow/mlflow (CVE-2023-6568)Advisory2023-12-07
AVID-2026-R1328External Control of File Name or Path in h2oai/h2o-3 (CVE-2023-6569)Advisory2023-12-14
AVID-2026-R1329Server-Side Request Forgery (SSRF) in kubeflow/kubeflow (CVE-2023-6570)Advisory2023-12-14
AVID-2026-R1330Cross-site Scripting (XSS) - Reflected in kubeflow/kubeflow (CVE-2023-6571)Advisory2023-12-14
AVID-2026-R1331Path Traversal in mlflow/mlflow (CVE-2023-6753)Advisory2023-12-13
AVID-2026-R1332Cross-site Scripting (XSS) - Stored in allegroai/clearml-server (CVE-2023-6778)Advisory2023-12-18
AVID-2026-R1333Path Traversal: '\.. ilename' in mlflow/mlflow (CVE-2023-6831)Advisory2023-12-15
AVID-2026-R1334Path Traversal: '\.. ilename' in mlflow/mlflow (CVE-2023-6909)Advisory2023-12-18
AVID-2026-R1335Command Injection (CVE-2023-6940)Advisory2023-12-19
AVID-2026-R1336Server-Side Request Forgery (SSRF) (CVE-2023-6974)Advisory2023-12-20
AVID-2026-R1337Unrestricted Upload of File with Dangerous Type (CVE-2023-6976)Advisory2023-12-20
AVID-2026-R1338Deserialization of Untrusted Data in huggingface/transformers (CVE-2023-7018)Advisory2023-12-20
AVID-2026-R1339Vulnerability CVE-2024-0072Advisory2024-04-05
AVID-2026-R1340Vulnerability CVE-2024-0076Advisory2024-04-05
AVID-2026-R1341CVE (CVE-2024-0087)Advisory2024-05-09
AVID-2026-R1342CVE (CVE-2024-0095)Advisory2024-06-13
AVID-2026-R1343CVE (CVE-2024-0100)Advisory2024-05-09
AVID-2026-R1344Vulnerability CVE-2024-0102Advisory2024-08-08
AVID-2026-R1345CVE (CVE-2024-0103)Advisory2024-06-13
AVID-2026-R1346Vulnerability CVE-2024-0109Advisory2024-08-31
AVID-2026-R1347Vulnerability CVE-2024-0110Advisory2024-08-31
AVID-2026-R1348Vulnerability CVE-2024-0115Advisory2024-08-09
AVID-2026-R1349Vulnerability CVE-2024-0116Advisory2024-10-01
AVID-2026-R1350Vulnerability CVE-2024-0125Advisory2024-10-03
AVID-2026-R1351Vulnerability CVE-2024-0140Advisory2025-01-28
AVID-2026-R1352Vulnerability CVE-2024-0378Advisory2024-03-02
AVID-2026-R1353AI ChatBot <= 5.3.4 - Missing Authorization via openai_file_list_callback (CVE-2024-0451)Advisory2024-05-22
AVID-2026-R1354AI ChatBot <= 5.3.4 - Missing Authorization via openai_file_delete_callback (CVE-2024-0453)Advisory2024-05-22
AVID-2026-R1355Remote Code Execution due to Full Controlled File Write in mlflow/mlflow (CVE-2024-0520)Advisory2024-06-06
AVID-2026-R1356Download and export of file via default user role (CVE-2024-0551)Advisory2024-02-27
AVID-2026-R1357DeepFaceLab Util.py deserialization (CVE-2024-0654)Advisory2024-01-18
AVID-2026-R1358Improper validation of document removal parameter (CVE-2024-0763)Advisory2024-02-27
AVID-2026-R1359Vulnerability CVE-2024-0815Advisory2024-03-07
AVID-2026-R1360Vulnerability CVE-2024-0818Advisory2024-03-07
AVID-2026-R1361Vulnerability CVE-2024-0917Advisory2024-03-07
AVID-2026-R1362Path Traversal and OS Command Injection in parisneo/lollms-webui (CVE-2024-10019)Advisory2025-03-20
AVID-2026-R1363flairNLP flair Mode File Loader clustering.py ClusteringModel code injection (CVE-2024-10073)Advisory2024-10-17
AVID-2026-R1364Stored XSS in comfyanonymous/comfyui (CVE-2024-10099)Advisory2024-10-17
AVID-2026-R1365Remote Code Execution in infiniflow/ragflow (CVE-2024-10131)Advisory2024-10-19
AVID-2026-R1366Unauthenticated Remote Code Execution in ElasticRendezvousHandler in horovod/horovod (CVE-2024-10190)Advisory2025-03-20
AVID-2026-R1367chidiwilliams buzz model_loader.py download_model temp file (CVE-2024-10372)Advisory2024-10-25
AVID-2026-R1368Denial of Service by ReDOS in h2oai/h2o-3 (CVE-2024-10549)Advisory2025-03-20
AVID-2026-R1369Denial of Service by ReDOS in h2oai/h2o-3 (CVE-2024-10550)Advisory2025-03-20
AVID-2026-R1370Jdbc Deserialization in h2oai/h2o-3 (CVE-2024-10553)Advisory2025-03-20
AVID-2026-R1371Denial of Service and Arbitrary File Write in h2oai/h2o-3 (CVE-2024-10572)Advisory2025-03-20
AVID-2026-R1372Regular Expression Denial of Service (ReDoS) in gradio-app/gradio (CVE-2024-10624)Advisory2025-03-20
AVID-2026-R1373Path Traversal in gradio-app/gradio (CVE-2024-10648)Advisory2025-03-20
AVID-2026-R1374Open Redirect in binary-husky/gpt_academic (CVE-2024-10812)Advisory2025-03-20
AVID-2026-R1375Deserialization of Untrusted Data in binary-husky/gpt_academic (CVE-2024-11039)Advisory2025-03-20
AVID-2026-R1376Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2024-11392)Advisory2024-11-22
AVID-2026-R1377Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2024-11393)Advisory2024-11-22
AVID-2026-R1378Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2024-11394)Advisory2024-11-22
AVID-2026-R1379CORS Vulnerability in feast-dev/feast (CVE-2024-11602)Advisory2025-03-20
AVID-2026-R1380Privilege Escalation in langgenius/dify (CVE-2024-11821)Advisory2025-03-20
AVID-2026-R1381Remote Code Execution by Pickle Deserialization in open-mmlab/mmdetection (CVE-2024-12044)Advisory2025-03-20
AVID-2026-R1382Server-Side Request Forgery in haotian-liu/llava (CVE-2024-12068)Advisory2025-03-20
AVID-2026-R1383Remote Code Execution in kedro-org/kedro (CVE-2024-12215)Advisory2025-03-20
AVID-2026-R1384Arbitrary File Write via TarSlip in dmlc/gluon-cv (CVE-2024-12216)Advisory2025-03-20
AVID-2026-R1385Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text & Image Generator <= 1.3.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Upload (CVE-2024-12471)Advisory2025-01-07
AVID-2026-R1386Regular Expression Denial of Service (ReDoS) in huggingface/transformers (CVE-2024-12720)Advisory2025-03-20
AVID-2026-R1387Dependency on Vulnerable Third-Party Component exposes Vulnerabilities in NI Vision Software (CVE-2024-12740)Advisory2025-01-27
AVID-2026-R1388SQL Injection in the Amazon Redshift Python Connector affecting v2.1.4 (CVE-2024-12745)Advisory2024-12-24
AVID-2026-R1389SSRF in langgenius/dify (CVE-2024-12775)Advisory2025-03-20
AVID-2026-R1390Denial of Service in aimhubio/aim (CVE-2024-12777)Advisory2025-03-20
AVID-2026-R1391Path Traversal in mintplex-labs/anything-llm (CVE-2024-13059)Advisory2025-02-10
AVID-2026-R1392DeepFaceLab main.py apply_xseg deserialization (CVE-2024-1432)Advisory2024-02-11
AVID-2026-R1393S3 Bucket Takeover in h2oai/h2o-3 (CVE-2024-1456)Advisory2024-04-16
AVID-2026-R1394Path Traversal Vulnerability in mlflow/mlflow (CVE-2024-1483)Advisory2024-04-16
AVID-2026-R1395Path Traversal Vulnerability in parisneo/lollms-webui (CVE-2024-1511)Advisory2024-04-10
AVID-2026-R1396Cross-Site Request Forgery (CSRF) Leading to Remote Code Execution in parisneo/lollms-webui (CVE-2024-1522)Advisory2024-03-30
AVID-2026-R1397Command Injection in gradio-app/gradio via deploy+test-visual.yml workflow (CVE-2024-1540)Advisory2024-03-27
AVID-2026-R1398Stored XSS leading to RCE in parisneo/lollms-webui (CVE-2024-1602)Advisory2024-04-10
AVID-2026-R1399confirmed (CVE-2024-1603)Advisory2024-03-23
AVID-2026-R1400Local File Inclusion in gradio-app/gradio (CVE-2024-1728)Advisory2024-04-10
AVID-2026-R1401CSRF to RCE in significant-gravitas/autogpt (CVE-2024-1879)Advisory2024-06-06
AVID-2026-R1402Session Reuse Vulnerability in lunary-ai/lunary (CVE-2024-1902)Advisory2024-04-10
AVID-2026-R1403Path Traversal leading to Arbitrary File Write and RCE in vertaai/modeldb (CVE-2024-1961)Advisory2024-04-16
AVID-2026-R1404Command Injection in mudler/localai (CVE-2024-2029)Advisory2024-04-10
AVID-2026-R1405Directory Traversal in zenml-io/zenml (CVE-2024-2083)Advisory2024-04-16
AVID-2026-R1406Azure SDK Spoofing Vulnerability (CVE-2024-21421)Advisory2024-03-12
AVID-2026-R1407Vulnerability CVE-2024-21485Advisory2024-02-02
AVID-2026-R1408Vulnerability CVE-2024-21552Advisory2024-07-22
AVID-2026-R1409Vulnerability CVE-2024-21574Advisory2024-12-12
AVID-2026-R1410Vulnerability CVE-2024-21577Advisory2024-12-13
AVID-2026-R1411Remote code execution (CVE-2024-21649)Advisory2024-01-30
AVID-2026-R1412vantage6 insecure SSH configuration for node and server containers (CVE-2024-21653)Advisory2024-01-30
AVID-2026-R1413Vulnerability CVE-2024-21766Advisory2024-08-14
AVID-2026-R1414Path Traversal Vulnerability in parisneo/lollms-webui (CVE-2024-2178)Advisory2024-06-02
AVID-2026-R1415Vulnerability CVE-2024-21792Advisory2024-05-16
AVID-2026-R1416Vulnerability CVE-2024-21799Advisory2024-11-13
AVID-2026-R1417Vulnerability CVE-2024-21802Advisory2024-02-26
AVID-2026-R1418Vulnerability CVE-2024-21949Advisory2024-11-12
AVID-2026-R1419Remote Code Execution in aimhubio/aim (CVE-2024-2195)Advisory2024-04-10
AVID-2026-R1420Vulnerability CVE-2024-21974Advisory2024-11-12
AVID-2026-R1421Vulnerability CVE-2024-21975Advisory2024-11-12
AVID-2026-R1422SSRF Vulnerability in gradio-app/gradio (CVE-2024-2206)Advisory2024-03-27
AVID-2026-R1423Path Traversal and Arbitrary File Upload Vulnerability in qdrant/qdrant (CVE-2024-2221)Advisory2024-04-10
AVID-2026-R1424Spring Cloud Function Web DOS Vulnerability (CVE-2024-22271)Advisory2024-07-09
AVID-2026-R1425Unsecured endpoints in the jupyter-lsp server extension (CVE-2024-22415)Advisory2024-01-18
AVID-2026-R1426Vulnerability CVE-2024-22476Advisory2024-05-16
AVID-2026-R1427Client configured with permissive trust policies susceptible to rollback attack in Notary Project (CVE-2024-23332)Advisory2024-01-19
AVID-2026-R1428python-ecdsa vulnerable to Minerva attack on P-256 (CVE-2024-23342)Advisory2024-01-22
AVID-2026-R1429Vulnerability CVE-2024-23496Advisory2024-02-26
AVID-2026-R1430Path Traversal leading to Remote Code Execution in parisneo/lollms-webui (CVE-2024-2358)Advisory2024-05-16
AVID-2026-R1431Improper Neutralization of Special Elements used in an OS Command in parisneo/lollms-webui (CVE-2024-2359)Advisory2024-06-06
AVID-2026-R1432Vulnerability CVE-2024-23750Advisory2024-01-22
AVID-2026-R1433Vulnerability CVE-2024-23751Advisory2024-01-22
AVID-2026-R1434CORS settings overly permissive in vantage6 (CVE-2024-23823)Advisory2024-03-14
AVID-2026-R1435Use after free in C++ protobuf (CVE-2024-2410)Advisory2024-05-03
AVID-2026-R1436Vulnerability CVE-2024-24590Advisory2024-02-06
AVID-2026-R1437Vulnerability CVE-2024-24591Advisory2024-02-06
AVID-2026-R1438Vulnerability CVE-2024-24593Advisory2024-02-06
AVID-2026-R1439MindsDB Vulnerable to Bypass of SSRF Protection with DNS Rebinding (CVE-2024-24759)Advisory2024-09-05
AVID-2026-R1440RedisBloom heap buffer overflow in CF.LOADCHUNK command (CVE-2024-25115)Advisory2024-04-09
AVID-2026-R1441Vulnerability CVE-2024-25723Advisory2024-02-27
AVID-2026-R1442Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. (CVE-2024-27133)Advisory2024-02-23
AVID-2026-R1443Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf (CVE-2024-27134)Advisory2024-11-25
AVID-2026-R1444Apache Pulsar: Improper Input Validation in Pulsar Function Worker allows Remote Code Execution (CVE-2024-27135)Advisory2024-03-12
AVID-2026-R1445Apache Pulsar: Pulsar Functions Worker's Archive Extraction Vulnerability Allows Unauthorized File Modification (CVE-2024-27317)Advisory2024-03-12
AVID-2026-R1446Vulnerability CVE-2024-27318Advisory2024-02-23
AVID-2026-R1447Vulnerability CVE-2024-27319Advisory2024-02-23
AVID-2026-R1448Apache Pulsar: Pulsar Functions Worker Allows Unauthorized File Access and Unauthorized HTTP/HTTPS Proxying (CVE-2024-27894)Advisory2024-03-12
AVID-2026-R1449Jupyter Server Proxy's Websocket Proxying does not require authentication (CVE-2024-28179)Advisory2024-03-20
AVID-2026-R1450jupyter-scheduler's endpoint is missing authentication (CVE-2024-28188)Advisory2024-05-23
AVID-2026-R1451Vulnerability CVE-2024-28950Advisory2024-11-13
AVID-2026-R1452Vulnerability CVE-2024-29083Advisory2024-11-13
AVID-2026-R1453WordPress AI Engine plugin <= 2.1.4 - Arbitrary File Upload vulnerability (CVE-2024-29100)Advisory2024-03-28
AVID-2026-R1454Insecure Deserialization Leading to RCE in bentoml/bentoml (CVE-2024-2912)Advisory2024-04-16
AVID-2026-R1455TarSlip Vulnerability in deepjavalibrary/djl (CVE-2024-2914)Advisory2024-06-06
AVID-2026-R1456Local File Inclusion (LFI) via URI Fragment Parsing in mlflow/mlflow (CVE-2024-2928)Advisory2024-06-06
AVID-2026-R1457Cosign vulnerable to machine-wide denial of service via malicious artifacts (CVE-2024-29903)Advisory2024-04-10
AVID-2026-R1458Qdrant Full Snapshot REST API snapshots.rs path traversal (CVE-2024-3078)Advisory2024-03-29
AVID-2026-R1459Privilege Escalation via Improper Input Validation in mintplex-labs/anything-llm (CVE-2024-3101)Advisory2024-04-10
AVID-2026-R1460Remote Code Execution in mintplex-labs/anything-llm (CVE-2024-3104)Advisory2024-06-06
AVID-2026-R1461Remote Code Execution in create_conda_env function in parisneo/lollms (CVE-2024-3121)Advisory2024-06-24
AVID-2026-R1462GPT Academic: Pickle deserializing cookies may pose RCE risk (CVE-2024-31224)Advisory2024-04-08
AVID-2026-R1463Command Injection in parisneo/lollms-webui (CVE-2024-3126)Advisory2024-05-16
AVID-2026-R1464WordPress Copymatic plugin <= 1.6 - Unauthenticated Arbitrary File Upload vulnerability (CVE-2024-31351)Advisory2024-05-17
AVID-2026-R1465Privilege Escalation and Local File Inclusion in mintplex-labs/anything-llm (CVE-2024-3152)Advisory2024-06-06
AVID-2026-R1466Vulnerability CVE-2024-31580Advisory2024-04-17
AVID-2026-R1467Vulnerability CVE-2024-31583Advisory2024-04-17
AVID-2026-R1468Apache Zeppelin: Remote code execution by adding malicious JDBC connection string (CVE-2024-31864)Advisory2024-04-09
AVID-2026-R1469Kohya_ss is vulnerable to a command injection in basic_caption_gui.py (GHSL-2024-019) (CVE-2024-32022)Advisory2024-04-16
AVID-2026-R1470Kohya_ss vulnerable to path injection in `common_gui.py` `find_and_replace` function (`GHSL-2024-024`) (CVE-2024-32023)Advisory2024-04-16
AVID-2026-R1471Kohya_ss is vulnerable to a command injection in `group_images_gui.py` (`GHSL-2024-021`) (CVE-2024-32025)Advisory2024-04-16
AVID-2026-R1472Path Traversal in gaizhenbiao/chuanhuchatgpt (CVE-2024-3234)Advisory2024-06-06
AVID-2026-R1473Use of Uninitialized Variable Vulnerability in llama.cpp (CVE-2024-32878)Advisory2024-04-26
AVID-2026-R1474lobe-chat `/api/proxy` endpoint Server-Side Request Forgery vulnerability (CVE-2024-32964)Advisory2024-05-10
AVID-2026-R1475Buffer Over-read in Neural Processing Unit (CVE-2024-33037)Advisory2024-12-02
AVID-2026-R1476Path Traversal in parisneo/lollms-webui (CVE-2024-3322)Advisory2024-06-06
AVID-2026-R1477Vulnerability CVE-2024-33664Advisory2024-04-25
AVID-2026-R1478Deserialization of Untrusted Data in sagemaker-python-sdk (CVE-2024-34072)Advisory2024-05-03
AVID-2026-R1479Command Injection in sagemaker-python-sdk (CVE-2024-34073)Advisory2024-05-03
AVID-2026-R1480Vulnerability CVE-2024-34165Advisory2024-11-13
AVID-2026-R1481@cyclonedx/cyclonedx-library Improper Restriction of XML External Entity Reference vulnerability (CVE-2024-34345)Advisory2024-05-09
AVID-2026-R1482WordPress AI Engine plugin <= 2.2.63 - Auth. Arbitrary File Upload vulnerability (CVE-2024-34440)Advisory2024-05-13
AVID-2026-R1483Vulnerability CVE-2024-34997Advisory2024-05-17
AVID-2026-R1484Jupyter server on Windows discloses Windows user password hash (CVE-2024-35178)Advisory2024-06-06
AVID-2026-R1485TorchServe bypass allowed_urls configuration (CVE-2024-35198)Advisory2024-07-18
AVID-2026-R1486TorchServe gRPC Port Exposure (CVE-2024-35199)Advisory2024-07-18
AVID-2026-R1487Arbitrary Code Execution via Deserialization in huggingface/transformers (CVE-2024-3568)Advisory2024-04-10
AVID-2026-R1488Path Traversal in qdrant/qdrant (CVE-2024-3584)Advisory2024-05-30
AVID-2026-R1489Apache Submarine Server Core: authorization bypass (CVE-2024-36265)Advisory2024-06-12
AVID-2026-R1490Vulnerability CVE-2024-36328Advisory2025-04-02
AVID-2026-R1491Vulnerability CVE-2024-36336Advisory2025-04-02
AVID-2026-R1492Vulnerability CVE-2024-36732Advisory2024-06-06
AVID-2026-R1493Vulnerability CVE-2024-36736Advisory2024-06-06
AVID-2026-R1494Vulnerability CVE-2024-36740Advisory2024-06-06
AVID-2026-R1495Vulnerability CVE-2024-37014Advisory2024-06-10
AVID-2026-R1496Vulnerability CVE-2024-37061Advisory2024-06-04
AVID-2026-R1497Vulnerability CVE-2024-37062Advisory2024-06-04
AVID-2026-R1498Vulnerability CVE-2024-37288Advisory2024-09-09
AVID-2026-R1499WordPress AI Power: Complete AI Pack – Powered by GPT-4 plugin <= 1.8.66 - Cross Site Scripting (XSS) vulnerability (CVE-2024-37465)Advisory2024-07-21
AVID-2026-R1500Path thraversal in DeepJavaLibrary (CVE-2024-37902)Advisory2024-06-17
AVID-2026-R1501Vulnerability CVE-2024-38302Advisory2024-07-18
AVID-2026-R1502Improper Restriction of XML External Entity Reference in org.cyclonedx:cyclonedx-core-java (CVE-2024-38374)Advisory2024-06-28
AVID-2026-R1503QNAP AI Core (CVE-2024-38647)Advisory2024-11-22
AVID-2026-R1504WordPress AI ENGINE plugin <= 2.4.7 - Server Side Request Forgery (SSRF) vulnerability (CVE-2024-38791)Advisory2024-08-01
AVID-2026-R1505fishaudio/Bert-VITS2 Command Injection in webui_preprocess.py bert_gen function (CVE-2024-39686)Advisory2024-07-22
AVID-2026-R1506fishaudio/Bert-VITS2 Limited File Write in webui_preprocess.py generate_config function (CVE-2024-39688)Advisory2024-07-22
AVID-2026-R1507Remote Code Execution (RCE) vulnerability in jupyterlab extension template `update-integration-tests` GitHub Action (CVE-2024-39700)Advisory2024-07-16
AVID-2026-R1508Vulnerability CVE-2024-39705Advisory2024-06-27
AVID-2026-R1509Apache Airflow: DAG Author Code Execution possibility in airflow-scheduler (CVE-2024-39877)Advisory2024-07-17
AVID-2026-R1510Vulnerability CVE-2024-40441Advisory2024-09-23
AVID-2026-R1511Vulnerability CVE-2024-40442Advisory2024-09-23
AVID-2026-R1512Remote code execution in streamlit geospatial in pages/1_📷_Timelapse.py MODIS Ocean Color SMI option palette (CVE-2024-41115)Advisory2024-07-26
AVID-2026-R1513Remote code execution in streamlit geospatial in pages/10_🌍_Earth_Engine_Datasets.py (CVE-2024-41117)Advisory2024-07-26
AVID-2026-R1514streamlit-geospatial remote code execution in pages/8_🏜️_Raster_Data_Visualization.py (CVE-2024-41119)Advisory2024-07-26
AVID-2026-R1515llama.cpp null pointer dereference in gguf_init_from_file (CVE-2024-41130)Advisory2024-07-22
AVID-2026-R1516Insecure Jinja2 templates rendered in Haystack Components can lead to RCE (CVE-2024-41950)Advisory2024-07-31
AVID-2026-R1517open-telemetry has an Observable Timing Discrepancy (CVE-2024-42368)Advisory2024-08-13
AVID-2026-R1518Streamlit Path Traversal Security Vulnerability on Windows (CVE-2024-42474)Advisory2024-08-12
AVID-2026-R1519llama.cpp global-buffer-overflow in ggml_type_size (CVE-2024-42477)Advisory2024-08-12
AVID-2026-R1520llama.cpp allows Arbitrary Address Read in rpc_server::get_tensor (CVE-2024-42478)Advisory2024-08-12
AVID-2026-R1521llama.cpp allows write-what-where in rpc_server::set_tensor (CVE-2024-42479)Advisory2024-08-12
AVID-2026-R1522Secrets Exfiltration in gradio-app/gradio (CVE-2024-4254)Advisory2024-06-04
AVID-2026-R1523Remote Code Execution in berriai/litellm (CVE-2024-4264)Advisory2024-05-18
AVID-2026-R1524Vulnerability CVE-2024-42835Advisory2024-10-31
AVID-2026-R1525Lack of login attempt rate-limiting in zenml-io/zenml (CVE-2024-4311)Advisory2024-11-14
AVID-2026-R1526Remote Code Execution due to LFI in '/install_extension' in parisneo/lollms-webui (CVE-2024-4320)Advisory2024-06-06
AVID-2026-R1527Server-Side Request Forgery (SSRF) in gradio-app/gradio (CVE-2024-4325)Advisory2024-06-06
AVID-2026-R1528Remote Code Execution via `/apply_settings` and `/execute_code` in parisneo/lollms-webui (CVE-2024-4326)Advisory2024-05-16
AVID-2026-R1529DeepSpeed Remote Code Execution Vulnerability (CVE-2024-43497)Advisory2024-10-08
AVID-2026-R1530CSRF in restart_program in parisneo/lollms-webui (CVE-2024-4403)Advisory2024-06-10
AVID-2026-R1531Apache Airflow: Authenticated DAG authors could execute code on scheduler nodes (CVE-2024-45034)Advisory2024-09-07
AVID-2026-R1532Vulnerability CVE-2024-45201Advisory2024-08-22
AVID-2026-R1533Vulnerability CVE-2024-45758Advisory2024-09-06
AVID-2026-R1534Vulnerability CVE-2024-45846Advisory2024-09-12
AVID-2026-R1535Vulnerability CVE-2024-45851Advisory2024-09-12
AVID-2026-R1536Vulnerability CVE-2024-45857Advisory2024-09-12
AVID-2026-R1537Computer Vision Annotation Tool (CVAT) contains a stored XSS via the quality report data endpoint (CVE-2024-47063)Advisory2024-09-30
AVID-2026-R1538CORS origin validation is not performed when the request has a cookie in Gradio (CVE-2024-47084)Advisory2024-10-10
AVID-2026-R1539The `is_in_or_equal` function may be bypassed in Gradio (CVE-2024-47164)Advisory2024-10-10
AVID-2026-R1540One-level read path traversal in `/custom_component` in Gradio (CVE-2024-47166)Advisory2024-10-10
AVID-2026-R1541SSRF in the path parameter of /queue/join in Gradio (CVE-2024-47167)Advisory2024-10-10
AVID-2026-R1542The `enable_monitoring` flag set to `False` does not disable monitoring in Gradio (CVE-2024-47168)Advisory2024-10-10
AVID-2026-R1543Agnai vulnerable to Remote Code Execution via JS Upload using Directory Traversal (CVE-2024-47169)Advisory2024-09-26
AVID-2026-R1544Computer Vision Annotation Tool (CVAT) access control is broken in several PATCH endpoints (CVE-2024-47172)Advisory2024-09-30
AVID-2026-R1545Vulnerability CVE-2024-47481Advisory2024-10-25
AVID-2026-R1546Vulnerability CVE-2024-47483Advisory2024-10-25
AVID-2026-R1547Lack of integrity check on the downloaded FRP client in Gradio (CVE-2024-47867)Advisory2024-10-10
AVID-2026-R1548Insecure communication between the FRP client and server in Gradio (CVE-2024-47871)Advisory2024-10-10
AVID-2026-R1549Vulnerability CVE-2024-48052Advisory2024-11-04
AVID-2026-R1550Vulnerability CVE-2024-48057Advisory2024-11-04
AVID-2026-R1551Vulnerability CVE-2024-48063Advisory2024-10-29
AVID-2026-R1552TorchGeo Remote Code Execution Vulnerability (CVE-2024-49048)Advisory2024-11-12
AVID-2026-R1553Vulnerability CVE-2024-49194Advisory2024-12-17
AVID-2026-R1554IBM Watson Studio Local cross-site request forgery (CVE-2024-49340)Advisory2024-10-15
AVID-2026-R1555IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data denial of service (CVE-2024-49353)Advisory2024-11-26
AVID-2026-R1556XSS and Open Redirect via SVG File Upload in parisneo/lollms-webui (CVE-2024-5125)Advisory2024-11-14
AVID-2026-R1557Path Traversal in mudler/localai (CVE-2024-5182)Advisory2024-06-19
AVID-2026-R1558Arbitrary File Overwrite in download_model_with_test_data in onnx/onnx (CVE-2024-5187)Advisory2024-06-06
AVID-2026-R1559ReDoS in Giskard Scan text perturbation (CVE-2024-52524)Advisory2024-11-14
AVID-2026-R1560LLama Factory Remote OS Command Injection Vulnerability (CVE-2024-52803)Advisory2024-11-21
AVID-2026-R1561Issuer field partial matches allowed in pyjwt (CVE-2024-53861)Advisory2024-11-29
AVID-2026-R1562Vulnerability CVE-2024-53870Advisory2025-02-25
AVID-2026-R1563Vulnerability CVE-2024-53872Advisory2025-02-25
AVID-2026-R1564Vulnerability CVE-2024-53873Advisory2025-02-25
AVID-2026-R1565Vulnerability CVE-2024-53874Advisory2025-02-25
AVID-2026-R1566Vulnerability CVE-2024-53875Advisory2025-02-25
AVID-2026-R1567Vulnerability CVE-2024-53876Advisory2025-02-25
AVID-2026-R1568Vulnerability CVE-2024-53877Advisory2025-02-25
AVID-2026-R1569Vulnerability CVE-2024-53878Advisory2025-02-25
AVID-2026-R1570Vulnerability CVE-2024-53879Advisory2025-02-25
AVID-2026-R1571Vulnerability CVE-2024-53880Advisory2025-02-12
AVID-2026-R1572WordPress AIKCT Engine Chatbot, ChatGPT, Gemini, GPT-4o Best AI Chatbot plugin <= 1.6.2 - Cross Site Request Forgery (CSRF) vulnerability (CVE-2024-54306)Advisory2024-12-13
AVID-2026-R1573RCE via Property/Class Pollution in lightning-ai/pytorch-lightning (CVE-2024-5452)Advisory2024-06-06
AVID-2026-R1574Vulnerability CVE-2024-55459Advisory2025-01-08
AVID-2026-R1575RedisBloom Integer Overflow Remote Code Execution Vulnerability (CVE-2024-55656)Advisory2025-01-08
AVID-2026-R1576D-Tale allows Remote Code Execution through the Custom Filter Input (CVE-2024-55890)Advisory2024-12-13
AVID-2026-R1577MaxKB RCE vulnerability in function library (CVE-2024-56137)Advisory2025-01-02
AVID-2026-R1578Firecrawl has SSRF Vulnerability via malicious scrape target (CVE-2024-56800)Advisory2024-12-30
AVID-2026-R1579Remote Code Execution in BerriAI/litellm (CVE-2024-5751)Advisory2024-06-27
AVID-2026-R1580Unprotected WebSocket in stitionai/devika (CVE-2024-5820)Advisory2024-06-27
AVID-2026-R1581Denial of Service via Invalid Argument in h2oai/h2o-3 (CVE-2024-5979)Advisory2024-06-27
AVID-2026-R1582Arbitrary File Write via /v1/runs API endpoint in lightning-ai/pytorch-lightning (CVE-2024-5980)Advisory2024-06-27
AVID-2026-R1583Missing client_id in parisneo/lollms-webui (CVE-2024-6040)Advisory2024-08-01
AVID-2026-R1584SSRF and Partial LFI in /models/apply Endpoint in mudler/localai (CVE-2024-6095)Advisory2024-07-06
AVID-2026-R1585Remote Code Execution in pypa/setuptools (CVE-2024-6345)Advisory2024-07-15
AVID-2026-R1586Arbitrary File Overwrite and Data Exfiltration in aimhubio/aim (CVE-2024-6396)Advisory2024-07-12
AVID-2026-R1587Arbitrary File/Directory Deletion in aimhubio/aim (CVE-2024-6483)Advisory2025-03-20
AVID-2026-R1588Unclaimed S3 Bucket Usage in pytorch/serve (CVE-2024-6577)Advisory2025-03-20
AVID-2026-R1589Path Traversal in stangirard/quivr (CVE-2024-6583)Advisory2025-03-20
AVID-2026-R1590Remote Code Execution in BerriAI/litellm (CVE-2024-6825)Advisory2025-03-20
AVID-2026-R1591Arbitrary File Overwrite through tarfile-extraction in aimhubio/aim (CVE-2024-6829)Advisory2025-03-20
AVID-2026-R1592SmartSearchWP < 2.4.6 - Unauthenticated OpenAI Key Disclosure (CVE-2024-6845)Advisory2024-09-25
AVID-2026-R1593Arbitrary File Overwrite in h2oai/h2o-3 (CVE-2024-6854)Advisory2025-03-20
AVID-2026-R1594Arbitrary File Write in mudler/LocalAI (CVE-2024-6868)Advisory2024-10-29
AVID-2026-R1595JFrog Artifactory Cache Poisoning (CVE-2024-6915)Advisory2024-08-05
AVID-2026-R1596Remote Code Execution in Calculate Function in parisneo/lollms (CVE-2024-6982)Advisory2025-03-20
AVID-2026-R1597Remote Code Execution in mudler/localai (CVE-2024-6983)Advisory2024-09-27
AVID-2026-R1598Remote Code Execution due to Arbitrary File Write in open-webui/open-webui (CVE-2024-7034)Advisory2025-03-20
AVID-2026-R1599Improper Neutralization of Special Elements used in a Command ('Command Injection') in GitLab (CVE-2024-7110)Advisory2024-08-22
AVID-2026-R1600AI Chatbot with ChatGPT by AYS <= 2.0.9 - Unauthenticated OpenAI Key Disclosure (CVE-2024-7713)Advisory2024-09-27
AVID-2026-R1601AI Assistant with ChatGPT by AYS <= 2.0.9 - Unauthenticated AJAX Calls (CVE-2024-7714)Advisory2024-09-27
AVID-2026-R1602CSRF in aimhubio/aim (CVE-2024-7760)Advisory2025-03-20
AVID-2026-R1603Denial of Service in h2oai/h2o-3 (CVE-2024-7765)Advisory2025-03-20
AVID-2026-R1604Denial of Service in h2oai/h2o-3 (CVE-2024-7768)Advisory2025-03-20
AVID-2026-R1605Arbitrary File Overwrite in onnx/onnx (CVE-2024-7776)Advisory2025-03-20
AVID-2026-R1606Arbitrary File Overwrite in danswer-ai/danswer (CVE-2024-7957)Advisory2025-03-20
AVID-2026-R1607Arbitrary File Write/Overwrite in lightning-ai/pytorch-lightning (CVE-2024-8019)Advisory2025-03-20
AVID-2026-R1608Open Redirect in gradio-app/gradio (CVE-2024-8021)Advisory2025-03-20
AVID-2026-R1609Denial of Service in aimhubio/aim (CVE-2024-8061)Advisory2025-03-20
AVID-2026-R1610Denial of Service in h2oai/h2o-3 (CVE-2024-8062)Advisory2025-03-20
AVID-2026-R1611Divide by Zero in ollama/ollama (CVE-2024-8063)Advisory2025-03-20
AVID-2026-R1612CSRF in danswer-ai/danswer (CVE-2024-8065)Advisory2025-03-20
AVID-2026-R1613CORS Misconfiguration in prefecthq/prefect (CVE-2024-8183)Advisory2025-03-20
AVID-2026-R1614Unrestricted Code Execution in aimhubio/aim (CVE-2024-8238)Advisory2025-03-20
AVID-2026-R1615Path Traversal in mintplex-labs/anything-llm (CVE-2024-8248)Advisory2025-03-20
AVID-2026-R1616Improper Protection of Alternate Path in GitLab (CVE-2024-8311)Advisory2024-09-12
AVID-2026-R1617Object deserialization in Reverb leading to RCE (CVE-2024-8375)Advisory2024-09-19
AVID-2026-R1618Path Traversal in modelscope/agentscope (CVE-2024-8438)Advisory2025-03-20
AVID-2026-R1619CORS Vulnerability in modelscope/agentscope (CVE-2024-8487)Advisory2025-03-20
AVID-2026-R1620Remote Code Execution via Deserialization in modelscope/agentscope (CVE-2024-8502)Advisory2025-03-20
AVID-2026-R1621Local File Inclusion (LFI) in modelscope/agentscope (CVE-2024-8550)Advisory2025-02-10
AVID-2026-R1622Path Traversal in modelscope/agentscope (CVE-2024-8551)Advisory2025-03-20
AVID-2026-R1623Arbitrary File Overwrite in h2oai/h2o-3 (CVE-2024-8616)Advisory2025-03-20
AVID-2026-R1624Arbitrary File Deletion via Relative Path Traversal in aimhubio/aim (CVE-2024-8769)Advisory2025-03-20
AVID-2026-R1625Ansible-core: exposure of sensitive information in ansible vault files due to improper logging (CVE-2024-8775)Advisory2024-09-14
AVID-2026-R1626Path Traversal in mlflow/mlflow (CVE-2024-8859)Advisory2025-03-20
AVID-2026-R1627h2oai h2o-3 JDBC Connection 1 getConnectionSafe deserialization (CVE-2024-8862)Advisory2024-09-14
AVID-2026-R1628Path Traversal in parisneo/lollms-webui (CVE-2024-8898)Advisory2025-03-20
AVID-2026-R1629Local File Inclusion in bentoml/openllm (CVE-2024-8982)Advisory2025-03-20
AVID-2026-R1630Denial of Service in bentoml/bentoml (CVE-2024-9056)Advisory2025-03-20
AVID-2026-R1631Privilege Escalation in lunary-ai/lunary (CVE-2024-9098)Advisory2025-03-20
AVID-2026-R1632Denial of Service (DoS) via Multipart Boundary in zenml-io/zenml (CVE-2024-9340)Advisory2025-03-20
AVID-2026-R1633Directory Traversal in polyaxon/polyaxon (CVE-2024-9362)Advisory2025-03-20
AVID-2026-R1634Cross-Site Request Forgery (CSRF) in polyaxon/polyaxon (CVE-2024-9365)Advisory2025-03-20
AVID-2026-R1635Improper Privilege Management in transformeroptimus/superagi (CVE-2024-9431)Advisory2025-03-20
AVID-2026-R1636Remote Code Execution in transformeroptimus/superagi (CVE-2024-9439)Advisory2025-03-20
AVID-2026-R1637Stored XSS in Kubeflow Pipeline View (CVE-2024-9526)Advisory2024-11-18
AVID-2026-R1638Remote Code Execution in kedro-org/kedro (CVE-2024-9701)Advisory2025-03-20
AVID-2026-R1639Missing Authentication Check in parisneo/lollms-webui (CVE-2024-9919)Advisory2025-03-20
AVID-2026-R1640Unrestricted File Upload and Execution in parisneo/lollms-webui (CVE-2024-9920)Advisory2025-03-20
AVID-2026-R1641Denial of Service (DoS) by Sending Large Filename at File Upload Endpoint in gradio-app/gradio (CVE-2025-0187)Advisory2025-03-20
AVID-2026-R1642SSRF in gaizhenbiao/chuanhuchatgpt (CVE-2025-0188)Advisory2025-03-20
AVID-2026-R1643Stored Cross-site Scripting (XSS) in wandb/openui (CVE-2025-0192)Advisory2025-03-20
AVID-2026-R1644Exposure of Sensitive Information in berriai/litellm (CVE-2025-0330)Advisory2025-03-20
AVID-2026-R1645SSRF Check Bypass in Requests Utility in significant-gravitas/autogpt (CVE-2025-0454)Advisory2025-03-20
AVID-2026-R1646MD5 Hash Collision in SageMaker Workflow in aws/sagemaker-python-sdk (CVE-2025-0508)Advisory2025-03-20
AVID-2026-R1647Stack Exhaustion In Tensorflow Serving (CVE-2025-0649)Advisory2025-05-06
AVID-2026-R1648Improper Access Control vulnerability in EmbedAI (CVE-2025-0744)Advisory2025-01-30
AVID-2026-R1649Path traversal issue in Deep Java Library (CVE-2025-0851)Advisory2025-01-29
AVID-2026-R1650Orthanc Server Missing Authentication for Critical Function (CVE-2025-0896)Advisory2025-02-13
AVID-2026-R1651Regular Expression Denial of Service (ReDoS) in huggingface/transformers (CVE-2025-1194)Advisory2025-04-29
AVID-2026-R1652Weak Password Requirements in mlflow/mlflow (CVE-2025-1474)Advisory2025-03-20
AVID-2026-R1653vLLM AIBrix Prefix Caching hash.go random values (CVE-2025-1953)Advisory2025-03-04
AVID-2026-R1654Vulnerability CVE-2025-1979Advisory2025-03-06
AVID-2026-R1655Regular Expression Denial of Service (ReDoS) in huggingface/transformers (CVE-2025-2099)Advisory2025-05-19
AVID-2026-R1656PyTorch Tuple torch.ops.profiler._call_end_callbacks_on_jit_fut memory corruption (CVE-2025-2148)Advisory2025-03-10
AVID-2026-R1657AutoGPT SSRF vulnerability (CVE-2025-22603)Advisory2025-03-10
AVID-2026-R1658Vulnerability CVE-2025-22892Advisory2025-05-13
AVID-2026-R1659Gradio Blocked Path ACL Bypass Vulnerability (CVE-2025-23042)Advisory2025-01-14
AVID-2026-R1660CVAT allows remote code execution via tracker Nuclio functions (CVE-2025-23045)Advisory2025-01-28
AVID-2026-R1661Vulnerability CVE-2025-23243Advisory2025-03-11
AVID-2026-R1662Vulnerability CVE-2025-23247Advisory2025-05-27
AVID-2026-R1663Vulnerability CVE-2025-23249Advisory2025-04-22
AVID-2026-R1664Vulnerability CVE-2025-23250Advisory2025-04-22
AVID-2026-R1665Vulnerability CVE-2025-23360Advisory2025-03-11
AVID-2026-R1666WordPress Salvador – AI Image Generator plugin <= 1.0.11 - Broken Access Control vulnerability (CVE-2025-23954)Advisory2025-01-16
AVID-2026-R1667The Snowflake Connector for Python uses insecure cache files permissions (CVE-2025-24795)Advisory2025-01-29
AVID-2026-R1668Label Studio has a Path Traversal Vulnerability via image Field (CVE-2025-25295)Advisory2025-02-14
AVID-2026-R1669Rembg CORS misconfiguration (CVE-2025-25302)Advisory2025-03-03
AVID-2026-R1670Remote code execution when loading a crafted GraphQL schema (CVE-2025-27407)Advisory2025-03-12
AVID-2026-R1671Snowflake JDBC Driver client-side encryption key in DEBUG logs (CVE-2025-27496)Advisory2025-03-13
AVID-2026-R1672Applio allows SSRF and file write in model_download.py (CVE-2025-27775)Advisory2025-03-19
AVID-2026-R1673Applio allows unsafe deserialization in model_information.py (CVE-2025-27780)Advisory2025-03-19
AVID-2026-R1674Applio allows unsafe deserialization in inference.py (CVE-2025-27781)Advisory2025-03-19
AVID-2026-R1675Applio allows arbitrary file write in inference.py (CVE-2025-27782)Advisory2025-03-19
AVID-2026-R1676Applio allows a DoS in restart.py (CVE-2025-27787)Advisory2025-03-19
AVID-2026-R1677Vulnerability CVE-2025-29189Advisory2025-04-09
AVID-2026-R1678vLLM Allows Remote Code Execution via Mooncake Integration (CVE-2025-29783)Advisory2025-03-19
AVID-2026-R1679Apache Parquet Java: Arbitrary code execution in the parquet-avro module when reading an Avro schema from a Parquet file metadata (CVE-2025-30065)Advisory2025-04-01
AVID-2026-R1680Remote Code Execution Vulnerability in vLLM Multi-Node Cluster Configuration (CVE-2025-30165)Advisory2025-05-06
AVID-2026-R1681Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability (CVE-2025-30387)Advisory2025-05-13
AVID-2026-R1682Azure Bot Framework SDK Elevation of Privilege Vulnerability (CVE-2025-30389)Advisory2025-04-30
AVID-2026-R1683Azure ML Compute Elevation of Privilege Vulnerability (CVE-2025-30390)Advisory2025-04-30
AVID-2026-R1684Azure AI Bot Elevation of Privilege Vulnerability (CVE-2025-30392)Advisory2025-04-30
AVID-2026-R1685MindSpore mindspore.numpy.fft.hfftn memory corruption (CVE-2025-3144)Advisory2025-04-03
AVID-2026-R1686MindSpore mindspore.numpy.fft.rfft2 memory corruption (CVE-2025-3145)Advisory2025-04-03
AVID-2026-R1687AutoGPT allows SSRF due to DNS Rebinding in requests wrapper (CVE-2025-31490)Advisory2025-04-14
AVID-2026-R1688InternLM LMDeploy conf.py open code injection (CVE-2025-3163)Advisory2025-04-03
AVID-2026-R1689Denial of Service by abusing xgrammar unbounded cache in memory (CVE-2025-32381)Advisory2025-04-09
AVID-2026-R1690MaxKB has a reverse shell vulnerability in function library (CVE-2025-32383)Advisory2025-04-10
AVID-2026-R1691PyTorch: `torch.load` with `weights_only=True` leads to remote code execution (CVE-2025-32434)Advisory2025-04-18
AVID-2026-R1692vLLM Vulnerable to Remote Code Execution via Mooncake Integration (CVE-2025-32444)Advisory2025-04-30
AVID-2026-R1693labsai/eddi Vulnerable to Path Traversal (Zip Slip) in ZIP Import Function (CVE-2025-32779)Advisory2025-04-15
AVID-2026-R1694conda-forge-webservices has an Unauthorized Artifact Modification Race Condition (CVE-2025-32784)Advisory2025-04-15
AVID-2026-R1695PyTorch LossCTC.cpp torch.nn.functional.ctc_loss denial of service (CVE-2025-3730)Advisory2025-04-16
AVID-2026-R1696PyTorch nccl.py torch.cuda.nccl.reduce denial of service (CVE-2025-4287)Advisory2025-05-05
AVID-2026-R1697GHSL-2025-012_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43842)Advisory2025-05-05
AVID-2026-R1698GHSL-2025-013_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43843)Advisory2025-05-05
AVID-2026-R1699GHSL-2025-016_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43846)Advisory2025-05-05
AVID-2026-R1700GHSL-2025-017_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43847)Advisory2025-05-05
AVID-2026-R1701GHSL-2025-019_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43849)Advisory2025-05-05
AVID-2026-R1702GHSL-2025-020_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43850)Advisory2025-05-05
AVID-2026-R1703GHSL-2025-021_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43851)Advisory2025-05-05
AVID-2026-R1704Divide By Zero in dlib (CVE-2025-4637)Advisory2025-05-14
AVID-2026-R1705LLaMA-Factory Allows Arbitrary Code Execution via Unsafe Deserialization in Ilamafy_baichuan2.py (CVE-2025-46567)Advisory2025-05-01
AVID-2026-R1706OZI-Project/ozi-publish Code Injection vulnerability (CVE-2025-47271)Advisory2025-05-12
AVID-2026-R1707ToolHive stores secrets in the state store with no encryption (CVE-2025-47274)Advisory2025-05-12
AVID-2026-R1708vLLM Allows Remote Code Execution via PyNcclPipe Communication Service (CVE-2025-47277)Advisory2025-05-20
AVID-2026-R17095ire Client Vulnerable to Cross-Site Scripting (XSS) and Remote Code Execution (RCE) (CVE-2025-47777)Advisory2025-05-14
AVID-2026-R1710vLLM has a Regular Expression Denial of Service (ReDoS, Exponential Complexity) Vulnerability in `pythonic_tool_parser.py` (CVE-2025-48887)Advisory2025-05-30
AVID-2026-R1711Gradio Allows Unauthorized File Copy via Path Manipulation (CVE-2025-48889)Advisory2025-05-30
AVID-2026-R1712erdogant pypickle pypickle.py load deserialization (CVE-2025-5174)Advisory2025-05-26
AVID-2026-R1713erdogant pypickle pypickle.py save improper authorization (CVE-2025-5175)Advisory2025-05-26
AVID-2026-R1714Trivy ecosystem supply chain briefly compromised (CVE-2026-33634)Advisory2026-03-23

2025

Report IDDescriptionReport TypeDate Reported
AVID-2025-R0001The application will provide the user with the answer to their math problem, violating existing controls.Advisory2025-01-17
AVID-2025-R0002Geopolitical bias in sentiment analysis for neutral phrasesAdvisory2025-01-17
AVID-2025-R0003Evaluation of the AI system gpt-4o-mini-2024-07-18 on the agentharm benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0004Evaluation of the AI system gpt-4o-mini-2024-07-18 on the wmdp_bio benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0005Evaluation of the AI system gpt-4o-mini-2024-07-18 on the wmdp_chem benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0006Evaluation of the AI system gpt-4o-mini-2024-07-18 on the wmdp_cyber benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0007Evaluation of the AI system gpt-4o-mini-2024-07-18 on the cyse2_interpreter_abuse benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0008Evaluation of the AI system gpt-4o-mini-2024-07-18 on the cyse2_prompt_injection benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0012Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the agentharm benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0013Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the wmdp_bio benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0014Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the wmdp_chem benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0015Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the wmdp_cyber benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0016Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the cyse2_interpreter_abuse benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0017Evaluation of the LLM Llama-3.3-70B-Instruct-Turbo on the cyse2_prompt_injection benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0021Evaluation of the LLM DeepSeek-R1 on the agentharm benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0022Evaluation of the LLM DeepSeek-R1 on the wmdp_bio benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0023Evaluation of the LLM DeepSeek-R1 on the wmdp_chem benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0024Evaluation of the LLM DeepSeek-R1 on the wmdp_cyber benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0025Evaluation of the LLM DeepSeek-R1 on the cyse2_interpreter_abuse benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0030Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the agentharm benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0031Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the wmdp_bio benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0032Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the wmdp_chem benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0033Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the wmdp_cyber benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0034Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the cyse2_interpreter_abuse benchmark using Inspect EvalsMeasurement2025-05-26
AVID-2025-R0035Evaluation of the LLM Mistral-Small-24B-Instruct-2501 on the cyse2_prompt_injection benchmark using Inspect EvalsMeasurement2025-05-26

2023

Report IDDescriptionReport TypeDate Reported
AVID-2023-R0001ChatGPT fails to follow lexical constraintsAdvisory2023-01-13
AVID-2023-R0002ChatGPT links wrong authors to papersIssue2023-01-05
AVID-2023-R0003It is possible to make ChatGPT perform remote code execution just by asking politelyAdvisory2023-03-26

2022

Report IDDescriptionReport TypeDate Reported
AVID-2022-R0001Gender Bias in Sentence Completion Tasks performed by bert-base-uncased using the HONEST metricDetection2022-11-09
AVID-2022-R0002Gender Bias in Sentence Completion Tasks performed by xlm-roberta-base using the HONEST scoreDetection2022-11-09
AVID-2022-R0003Profession bias reinforcing gender stereotypes found in bert-base-uncased, as measured on the Winobias datasetDetection2022-11-09
AVID-2022-R0004Profession bias reinforcing gender stereotypes found in xlm-roberta-base, as measured on the Winobias datasetDetection2022-11-09
AVID-2022-R0005Demographic bias found in EleutherAI/gpt-neo-125M for multiple sensitive categories, as measured on prompts supplied in the BOLD datasetDetection2022-11-09

Vulnerability

Vulnerabilities can be linked to one or more taxonomies through tags. In AVID taxonomy, these tags denote the risk domains (Security, Ethics, Performance), related (sub)categories, and lifecycle stages. A vulnerability in AVID can pertain to one or more of the three levels: dataset, model, or system.

List of Vulnerabilities

2023
Vulnerability IDDescription
AVID-2023-V001Evasion of Deep Learning Detector for Malware C&C Traffic
AVID-2023-V002Botnet Domain Generation Algorithm (DGA) Detection Evasion
AVID-2023-V003VirusTotal Poisoning
AVID-2023-V004Bypassing Cylance's AI Malware Detection
AVID-2023-V005Camera Hijack Attack on Facial Recognition System
AVID-2023-V006Attack on Machine Translation Service - Google Translate, Bing Translator, and Systran Translate
AVID-2023-V007ClearviewAI Misconfiguration
AVID-2023-V008GPT-2 Model Replication
AVID-2023-V009ProofPoint Evasion
AVID-2023-V010Microsoft Azure Service Disruption
AVID-2023-V011Microsoft Edge AI Evasion
AVID-2023-V012Face Identification System Evasion via Physical Countermeasures
AVID-2023-V013Backdoor Attack on Deep Learning Models in Mobile Apps
AVID-2023-V014Confusing Antimalware Neural Networks
AVID-2023-V015Compromised PyTorch Dependency Chain
AVID-2023-V016Achieving Code Execution in MathGPT via Prompt Injection
AVID-2023-V017Google’s YouTube Kids App Presents Inappropriate Content
AVID-2023-V018Warehouse robot ruptures can of bear spray and injures workers
AVID-2023-V019Crashes with Maneuvering Characteristics Augmentation System (MCAS)
AVID-2023-V020Collection of Robotic Surgery Malfunctions
AVID-2023-V021Uber Autonomous Cars Running Red Lights
AVID-2023-V022NY City School Teacher Evaluation Algorithm Contested
AVID-2023-V023Kronos Scheduling Algorithm Allegedly Caused Financial Issues for Starbucks Employees
AVID-2023-V024Northpointe Risk Models
AVID-2023-V025ChatGPT fails to follow lexical constraints
AVID-2023-V026ChatGPT generates false or incomplete references to scientific literature
AVID-2023-V027It is possible to make ChatGPT perform remote code execution just by asking politely
2022
Vulnerability IDDescription
AVID-2022-V001Gender Bias in Sentence Completion Tasks performed by bert-base-uncased
AVID-2022-V002Gender Bias in Sentence Completion Tasks performed by xlm-roberta-base
AVID-2022-V003Multiple fairness harms found in generated text from EleutherAI/gpt-neo-125M
AVID-2022-V004Facebook translates 'good morning' into 'attack them', leading to arrest
AVID-2022-V005Uber AV Killed Pedestrian in Arizona
AVID-2022-V006YouTube's Algorithms Failed to Remove Violating Content Related to Suicide and Self-Harm
AVID-2022-V007Israeli Tax Authority Employed Opaque Algorithm to Impose Fines, Reportedly Refusing to Provide an Explanation for Amount Calculation to a Farmer
AVID-2022-V008Security Robot Drowns Itself in a Fountain
AVID-2022-V009Deepfake Video of Ukrainian President Yielding to Russia Posted on Ukrainian Websites and Social Media
AVID-2022-V010Meta’s BlenderBot 3 Chatbot Demo Made Offensive Antisemitic Comments
AVID-2022-V011Predictive Policing Biases of PredPol
AVID-2022-V012Hive Box Facial-Recognition Locks Hacked by Fourth Graders Using Intended Recipient's Facial Photo
AVID-2022-V013TayBot