| AVID-2026-R0001 | Vulnerability CVE-2024-0132 | Advisory | 2024-09-26 |
| AVID-2026-R0002 | Incorrect Authorization in mintplex-labs/anything-llm (CVE-2024-10109) | Advisory | 2025-03-20 |
| AVID-2026-R0003 | Improper Privilege Management in lunary-ai/lunary (CVE-2024-10273) | Advisory | 2025-03-20 |
| AVID-2026-R0004 | Improper Authorization in lunary-ai/lunary (CVE-2024-10274) | Advisory | 2025-03-20 |
| AVID-2026-R0005 | Improper Access Control in lunary-ai/lunary (CVE-2024-10330) | Advisory | 2025-03-20 |
| AVID-2026-R0006 | Path Traversal in mintplex-labs/anything-llm (CVE-2024-10513) | Advisory | 2025-03-20 |
| AVID-2026-R0007 | Missing Authorization in lunary-ai/lunary (CVE-2024-10762) | Advisory | 2025-03-20 |
| AVID-2026-R0008 | Denial of Service (DoS) in invoke-ai/invokeai (CVE-2024-10821) | Advisory | 2025-03-20 |
| AVID-2026-R0009 | Denial of Service (DoS) via Multipart Boundary in eosphoros-ai/db-gpt (CVE-2024-10829) | Advisory | 2025-03-20 |
| AVID-2026-R0010 | Path Traversal in eosphoros-ai/db-gpt (CVE-2024-10830) | Advisory | 2025-03-20 |
| AVID-2026-R0011 | Arbitrary File Write through Absolute Path Traversal in eosphoros-ai/db-gpt (CVE-2024-10831) | Advisory | 2025-03-20 |
| AVID-2026-R0012 | Arbitrary File Write in eosphoros-ai/db-gpt (CVE-2024-10833) | Advisory | 2025-03-20 |
| AVID-2026-R0013 | Arbitrary File Write in eosphoros-ai/db-gpt (CVE-2024-10834) | Advisory | 2025-03-20 |
| AVID-2026-R0014 | Arbitrary File Write via SQL Injection in eosphoros-ai/db-gpt (CVE-2024-10835) | Advisory | 2025-03-20 |
| AVID-2026-R0015 | Cross-Site Request Forgery (CSRF) in eosphoros-ai/db-gpt (CVE-2024-10906) | Advisory | 2025-03-20 |
| AVID-2026-R0016 | Exposure of Sensitive System Information via ImagePromptTemplate in langchain-ai/langchain (CVE-2024-10940) | Advisory | 2025-03-20 |
| AVID-2026-R0017 | Code Injection in binary-husky/gpt_academic (CVE-2024-10950) | Advisory | 2025-03-20 |
| AVID-2026-R0018 | Prompt Injection Leading to RCE in binary-husky/gpt_academic Plugin `manim` (CVE-2024-10954) | Advisory | 2025-03-20 |
| AVID-2026-R0019 | Arbitrary File Delete in invoke-ai/invokeai (CVE-2024-11042) | Advisory | 2025-03-20 |
| AVID-2026-R0020 | Denial of Service (DoS) via Large Payload in Board Name Field in invoke-ai/invokeai (CVE-2024-11043) | Advisory | 2025-03-20 |
| AVID-2026-R0021 | Improper Access Control in lunary-ai/lunary (CVE-2024-11300) | Advisory | 2025-03-20 |
| AVID-2026-R0022 | Improper Enforcement of Unique Constraint in lunary-ai/lunary (CVE-2024-11301) | Advisory | 2025-03-20 |
| AVID-2026-R0023 | Remote Code Execution via Model Deserialization in invoke-ai/invokeai (CVE-2024-12029) | Advisory | 2025-03-20 |
| AVID-2026-R0024 | AI Scribe – SEO AI Writer, Content Generator, Humanizer, Blog Writer, SEO Optimizer, DALLE-3, AI WordPress Plugin ChatGPT (GPT-4o 128K) <= 2.3 - Missing Authorization to Authenticated (Subscriber+) Settings Update (CVE-2024-12606) | Advisory | 2025-01-10 |
| AVID-2026-R0025 | Denial of Service (DoS) in run-llama/llama_index (CVE-2024-12704) | Advisory | 2025-03-20 |
| AVID-2026-R0026 | SSRF in infiniflow/ragflow (CVE-2024-12779) | Advisory | 2025-03-20 |
| AVID-2026-R0027 | SQL Injection to RCE in run-llama/llama_index (CVE-2024-12909) | Advisory | 2025-03-20 |
| AVID-2026-R0028 | SQL Injection in run-llama/llama_index (CVE-2024-12911) | Advisory | 2025-03-20 |
| AVID-2026-R0029 | IBM watsonx.ai cross-site scripting (CVE-2024-49785) | Advisory | 2025-01-12 |
| AVID-2026-R0030 | Uncontrolled Resource Consumption in mlflow/mlflow (CVE-2024-6838) | Advisory | 2025-03-20 |
| AVID-2026-R0031 | Exposure of Sensitive Information in mintplex-labs/anything-llm (CVE-2024-6842) | Advisory | 2025-03-20 |
| AVID-2026-R0032 | Improper Access Control in lunary-ai/lunary (CVE-2024-8999) | Advisory | 2025-03-20 |
| AVID-2026-R0033 | Improper Authorization and Duplicate Slug Vulnerability in lunary-ai/lunary (CVE-2024-9000) | Advisory | 2025-03-20 |
| AVID-2026-R0034 | Arbitrary Code Execution via Crafted Keras Config for Model Loading (CVE-2025-1550) | Advisory | 2025-03-11 |
| AVID-2026-R0035 | picklescan - Security scanning bypass via 'pip main' (CVE-2025-1716) | Advisory | 2025-02-26 |
| AVID-2026-R0036 | picklescan - Security scanning bypass via non-standard file extensions (CVE-2025-1889) | Advisory | 2025-03-03 |
| AVID-2026-R0037 | picklescan ZIP archive manipulation attack leads to crash (CVE-2025-1944) | Advisory | 2025-03-10 |
| AVID-2026-R0038 | picklescan - Zip Flag Bit Exploit Crashes Picklescan But Not PyTorch (CVE-2025-1945) | Advisory | 2025-03-10 |
| AVID-2026-R0039 | Mage AI insecure default initialization of resource (CVE-2025-2129) | Advisory | 2025-03-09 |
| AVID-2026-R0040 | Microsoft Account Elevation of Privilege Vulnerability (CVE-2025-21396) | Advisory | 2025-01-29 |
| AVID-2026-R0041 | Azure AI Face Service Elevation of Privilege Vulnerability (CVE-2025-21415) | Advisory | 2025-01-29 |
| AVID-2026-R0042 | Vulnerability CVE-2025-23359 | Advisory | 2025-02-12 |
| AVID-2026-R0043 | NI Vision Builder AI VBAI File Processing Missing Warning Remote Code Execution Vulnerability (CVE-2025-2450) | Advisory | 2025-03-18 |
| AVID-2026-R0044 | Azure Promptflow Remote Code Execution Vulnerability (CVE-2025-24986) | Advisory | 2025-03-11 |
| AVID-2026-R0045 | BentoML Allows Remote Code Execution (RCE) via Insecure Deserialization (CVE-2025-27520) | Advisory | 2025-04-04 |
| AVID-2026-R0046 | Improper Control of Generation of Code ('Code Injection') in GitLab (CVE-2025-2867) | Advisory | 2025-03-27 |
| AVID-2026-R0047 | PyTorch torch.nn.utils.rnn.pad_packed_sequence memory corruption (CVE-2025-2998) | Advisory | 2025-03-31 |
| AVID-2026-R0048 | PyTorch torch.nn.utils.rnn.unpack_sequence memory corruption (CVE-2025-2999) | Advisory | 2025-03-31 |
| AVID-2026-R0049 | PyTorch torch.jit.script memory corruption (CVE-2025-3000) | Advisory | 2025-03-31 |
| AVID-2026-R0050 | PyTorch torch.lstm_cell memory corruption (CVE-2025-3001) | Advisory | 2025-03-31 |
| AVID-2026-R0051 | Vulnerability CVE-2025-3035 | Advisory | 2025-04-01 |
| AVID-2026-R0052 | PyTorch torch.jit.jit_module_from_flatbuffer memory corruption (CVE-2025-3121) | Advisory | 2025-04-02 |
| AVID-2026-R0053 | PyTorch CUDACachingAllocator.cpp torch.cuda.memory.caching_allocator_delete memory corruption (CVE-2025-3136) | Advisory | 2025-04-03 |
| AVID-2026-R0054 | ageerle ruoyi-ai API Interface SysModelController.java improper authorization (CVE-2025-3199) | Advisory | 2025-04-04 |
| AVID-2026-R0055 | Arbitrary file write from Cursor Agent through a prompt injection from malicious @Docs (CVE-2025-32018) | Advisory | 2025-04-08 |
| AVID-2026-R0056 | ageerle ruoyi-ai SysNoticeController.java improper authorization (CVE-2025-3202) | Advisory | 2025-04-04 |
| AVID-2026-R0057 | Insecure Deserialization leads to RCE in BentoML's runner server (CVE-2025-32375) | Advisory | 2025-04-09 |
| AVID-2026-R0058 | Langflow < 1.3.0 Unauthenticated RCE via /api/v1/validate/code (CVE-2025-3248) | Advisory | 2025-04-07 |
| AVID-2026-R0059 | Multiple Model Guardrail Jailbreak via "Urgent Health Inquiry" | Measurement | 2026-02-19 |
| AVID-2026-R0060 | Multiple Model Guardrail Jailbreak via "Hex Recipe Book" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0061 | Multiple Model Guardrail Jailbreak via "Incremental Table Completion" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0062 | Multiple Model Prompt Injection via "Correction" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0063 | Multiple Model Guardrail Jailbreak via "Chemical Compiler Debug" Tactic | Measurement | 2026-02-12 |
| AVID-2026-R0064 | Multiple Model Guardrail Jailbreak via "Split Mode" Response Requests | Measurement | 2026-02-19 |
| AVID-2026-R0065 | Multiple Model Guardrail Jailbreak via "Placeholder Injection" Tactic | Measurement | 2026-01-29 |
| AVID-2026-R0066 | Multiple Model Guardrail Jailbreak via "Deceptive Forensic Context" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0067 | Multiple Model Guardrail Jailbreak via "Technical Field Guide" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0068 | Multiple Model Guardrail Jailbreak via "Hybrid Role" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0069 | Multiple Model Guardrail Jailbreak via "API System Instructions" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0070 | Multiple Model Guardrail Jailbreak via "Haiku of Love" Tactic | Measurement | 2026-01-16 |
| AVID-2026-R0071 | Multiple Model Guardrail Jailbreak via "Choose Your Own Adventure" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0072 | Multiple Model Guardrail Jailbreak via "Chemist Code Language" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0073 | Multiple Model Guardrail Jailbreak via "Fashion Design Recipe" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0074 | Multiple Model Guardrail Jailbreak via "Science Student Safety" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0075 | Multiple Model Guardrail Jailbreak via "Show Character Role-Playing" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0076 | Multiple Model Guardrail Jailbreak via "Story Teller" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0077 | Multiple Model Guardrail Jailbreak via "Screenplay Deception" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0078 | Multiple Model Guardrail Jailbreak via "Police Interrogation Terminal" Tactic | Measurement | 2026-01-22 |
| AVID-2026-R0079 | Multiple Model Guardrail Jailbreak via "Compare and Contrast" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0080 | Multiple Model Guardrail Jailbreak via "Essay Title" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0081 | Multiple Model Guardrail Jailbreak via "Key-Value Pairs" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0082 | Multiple Model Guardrail Jailbreak via Token Disruption through Random Spacing | Measurement | 2026-02-19 |
| AVID-2026-R0083 | Multiple Model Guardrail Jailbreak via "Abbreviation Expansion" | Measurement | 2026-02-19 |
| AVID-2026-R0084 | Multiple Model Guardrail Jailbreak via "First Person Perspective" | Measurement | 2026-02-19 |
| AVID-2026-R0085 | Multiple Model Guardrail Jailbreak via "Psych-Phil DT + Compaction" Technique | Measurement | 2025-10-06 |
| AVID-2026-R0086 | Multiple Model Guardrail Jailbreak via "Super Short Prompt" | Measurement | 2025-10-17 |
| AVID-2026-R0087 | Multiple Model Guardrail Jailbreak via Investigative Journalist Persona | Measurement | 2026-02-19 |
| AVID-2026-R0088 | Multiple Model Guardrail Jailbreak via "Speculative Knowledge Preservation" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0089 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Classical Art Reframing" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0090 | Multiple Model Guardrail Jailbreak via Memory Dump Simulation Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0091 | NSFWOpenAI Sora Guardrail Jailbreak via "Anatomical Escalation" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0092 | Multiple Model Guardrail Jailbreak via "Mathematical Variable Obfuscation" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0093 | Multiple Model Guardrail Jailbreak via "Scientific Framing for Wrapper" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0094 | Multiple Model Guardrail Jailbreak via "Terminal Simulation" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0095 | Multiple Model Guardrail Jailbreak via "Servile Scientist" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0096 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Debug Framework Simulation" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0097 | NSFWOpenAI Sora Guardrail Jailbreak via "Hypothetical Anatomy" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0098 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Historical NSFW" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0099 | OpenAI GPT-4o Guardrail Jailbreak via "Layered Summarization" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0100 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Feminist Art Description" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0101 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Artistic Escalation" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0102 | Multiple Model Guardrail Jailbreak via "Academic Framing" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0103 | Multiple Model Guardrail Jailbreak via "Wiki Creation" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0104 | OpenAI GPT-4o Guardrail Jailbreak via "Zero-Width Unicode" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0105 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Historical Polaroid" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0106 | Multiple Model Guardrail Jailbreak via "Fictional API Detection" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0107 | NSFWOpenAI DALL-E3 Guardrail Jailbreak via "Surprise Attack" Tactic | Issue | 2026-02-19 |
| AVID-2026-R0108 | Multiple Model Guardrail Jailbreak via "Spelling Mistakes" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0109 | Multiple Model Guardrail Jailbreak via "Lambda Pattern Formatting" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0110 | Multiple Model Guardrail Jailbreak via "Apocalyptic Scenario" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0111 | Multiple Model Guardrail Jailbreak via "Scientific Formula" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0112 | OpenAI GPT-4o Guardrail Jailbreak via "Naval Parameters Cipher" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0113 | Multiple Model Guardrail Jailbreak via IPA Encoding Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0114 | Multiple Model Guardrail Jailbreak via "Chaotic Formatting" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0115 | Multiple Model Guardrail Jailbreak via "Leetspeak Unicode" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0116 | Multiple Model Guardrail Jailbreak via "Correct Me" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0117 | Multiple Model Guardrail Jailbreak via "Pronunciation Bypass" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0118 | Multiple Model Guardrail Jailbreak via "Chemist's Essay" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0119 | Multiple Model Guardrail Jailbreak via "Analyze Data" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0120 | OpenAI Multiple Model Prompt Injection via "Morse Code Businessman" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0121 | Multiple Model Guardrail Jailbreak via "Arbitrary Relation" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0122 | Multiple Model Guardrail Jailbreak via "Fortune Cookie Simulator" Tactic | Measurement | 2026-02-19 |
| AVID-2026-R0123 | Google Gemini G-Suite Prompt Injection Vulnerability | Issue | 2026-02-19 |
| AVID-2026-R0124 | Amazon Rufus Guardrail Jailbreak via ASCII Decimal Encoding | Issue | 2026-02-19 |
| AVID-2026-R0125 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`. | Measurement | 2026-02-20 |
| AVID-2026-R0126 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`. | Measurement | 2026-02-20 |
| AVID-2026-R0127 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`. | Measurement | 2026-02-20 |
| AVID-2026-R0128 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`. | Measurement | 2026-02-20 |
| AVID-2026-R0129 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`. | Measurement | 2026-02-20 |
| AVID-2026-R0130 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`. | Measurement | 2026-02-20 |
| AVID-2026-R0131 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`. | Measurement | 2026-02-20 |
| AVID-2026-R0132 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`. | Measurement | 2026-02-20 |
| AVID-2026-R0133 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`. | Measurement | 2026-02-20 |
| AVID-2026-R0134 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`. | Measurement | 2026-02-20 |
| AVID-2026-R0135 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`. | Measurement | 2026-02-20 |
| AVID-2026-R0136 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`. | Measurement | 2026-02-20 |
| AVID-2026-R0137 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`. | Measurement | 2026-02-20 |
| AVID-2026-R0138 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`. | Measurement | 2026-02-20 |
| AVID-2026-R0139 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`. | Measurement | 2026-02-20 |
| AVID-2026-R0140 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`. | Measurement | 2026-02-20 |
| AVID-2026-R0141 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`. | Measurement | 2026-02-20 |
| AVID-2026-R0142 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`. | Measurement | 2026-02-20 |
| AVID-2026-R0143 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`. | Measurement | 2026-02-20 |
| AVID-2026-R0144 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`. | Measurement | 2026-02-20 |
| AVID-2026-R0145 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`. | Measurement | 2026-02-20 |
| AVID-2026-R0146 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`. | Measurement | 2026-02-20 |
| AVID-2026-R0147 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`. | Measurement | 2026-02-20 |
| AVID-2026-R0148 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`. | Measurement | 2026-02-20 |
| AVID-2026-R0149 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`. | Measurement | 2026-02-20 |
| AVID-2026-R0150 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`. | Measurement | 2026-02-20 |
| AVID-2026-R0151 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`. | Measurement | 2026-02-20 |
| AVID-2026-R0152 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`. | Measurement | 2026-02-20 |
| AVID-2026-R0153 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`. | Measurement | 2026-02-20 |
| AVID-2026-R0154 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`. | Measurement | 2026-02-20 |
| AVID-2026-R0155 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`. | Measurement | 2026-02-20 |
| AVID-2026-R0156 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`. | Measurement | 2026-02-20 |
| AVID-2026-R0157 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`. | Measurement | 2026-02-20 |
| AVID-2026-R0158 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`. | Measurement | 2026-02-20 |
| AVID-2026-R0159 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`. | Measurement | 2026-02-20 |
| AVID-2026-R0160 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`. | Measurement | 2026-02-20 |
| AVID-2026-R0161 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`. | Measurement | 2026-02-20 |
| AVID-2026-R0162 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`. | Measurement | 2026-02-20 |
| AVID-2026-R0163 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`. | Measurement | 2026-02-20 |
| AVID-2026-R0164 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`. | Measurement | 2026-02-20 |
| AVID-2026-R0165 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`. | Measurement | 2026-02-20 |
| AVID-2026-R0166 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`. | Measurement | 2026-02-20 |
| AVID-2026-R0167 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`. | Measurement | 2026-02-20 |
| AVID-2026-R0168 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`. | Measurement | 2026-02-20 |
| AVID-2026-R0169 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`. | Measurement | 2026-02-20 |
| AVID-2026-R0170 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`. | Measurement | 2026-02-20 |
| AVID-2026-R0171 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`. | Measurement | 2026-02-20 |
| AVID-2026-R0172 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`. | Measurement | 2026-02-20 |
| AVID-2026-R0173 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`. | Measurement | 2026-02-20 |
| AVID-2026-R0174 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`. | Measurement | 2026-02-20 |
| AVID-2026-R0175 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`. | Measurement | 2026-02-20 |
| AVID-2026-R0176 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`. | Measurement | 2026-02-20 |
| AVID-2026-R0177 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`. | Measurement | 2026-02-20 |
| AVID-2026-R0178 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`. | Measurement | 2026-02-20 |
| AVID-2026-R0179 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`. | Measurement | 2026-02-20 |
| AVID-2026-R0180 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`. | Measurement | 2026-02-20 |
| AVID-2026-R0181 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`. | Measurement | 2026-02-20 |
| AVID-2026-R0182 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`. | Measurement | 2026-02-20 |
| AVID-2026-R0183 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`. | Measurement | 2026-02-20 |
| AVID-2026-R0184 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`. | Measurement | 2026-02-20 |
| AVID-2026-R0185 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`. | Measurement | 2026-02-20 |
| AVID-2026-R0186 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`. | Measurement | 2026-02-20 |
| AVID-2026-R0187 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`. | Measurement | 2026-02-20 |
| AVID-2026-R0188 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`. | Measurement | 2026-02-20 |
| AVID-2026-R0189 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`. | Measurement | 2026-02-20 |
| AVID-2026-R0190 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`. | Measurement | 2026-02-20 |
| AVID-2026-R0191 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`. | Measurement | 2026-02-20 |
| AVID-2026-R0192 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`. | Measurement | 2026-02-20 |
| AVID-2026-R0193 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`. | Measurement | 2026-02-20 |
| AVID-2026-R0194 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`. | Measurement | 2026-02-20 |
| AVID-2026-R0195 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`. | Measurement | 2026-02-20 |
| AVID-2026-R0196 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`. | Measurement | 2026-02-20 |
| AVID-2026-R0197 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`. | Measurement | 2026-02-20 |
| AVID-2026-R0198 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`. | Measurement | 2026-02-20 |
| AVID-2026-R0199 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`. | Measurement | 2026-02-20 |
| AVID-2026-R0200 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`. | Measurement | 2026-02-20 |
| AVID-2026-R0202 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`. | Measurement | 2026-02-20 |
| AVID-2026-R0203 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`. | Measurement | 2026-02-20 |
| AVID-2026-R0204 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`. | Measurement | 2026-02-20 |
| AVID-2026-R0205 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`. | Measurement | 2026-02-20 |
| AVID-2026-R0206 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`. | Measurement | 2026-02-20 |
| AVID-2026-R0207 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`. | Measurement | 2026-02-20 |
| AVID-2026-R0208 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`. | Measurement | 2026-02-20 |
| AVID-2026-R0209 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`. | Measurement | 2026-02-20 |
| AVID-2026-R0210 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`. | Measurement | 2026-02-20 |
| AVID-2026-R0211 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`. | Measurement | 2026-02-20 |
| AVID-2026-R0212 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`. | Measurement | 2026-02-20 |
| AVID-2026-R0213 | The model Kimi-K2-Instruct-0905 from Moonshot AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`. | Measurement | 2026-02-20 |
| AVID-2026-R0214 | Authenticated Command Injection in OpenClaw Docker Execution via PATH Environment Variable (CVE-2026-24763) | Advisory | 2026-02-02 |
| AVID-2026-R0215 | OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions (CVE-2026-24764) | Advisory | 2026-02-19 |
| AVID-2026-R0216 | OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand (CVE-2026-25157) | Advisory | 2026-02-04 |
| AVID-2026-R0217 | Vulnerability CVE-2026-25253 | Advisory | 2026-02-01 |
| AVID-2026-R0218 | OpenClaw has a Telegram webhook request forgery (missing `channels.telegram.webhookSecret`) → auth bypass (CVE-2026-25474) | Advisory | 2026-02-19 |
| AVID-2026-R0219 | OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction (CVE-2026-25475) | Advisory | 2026-02-04 |
| AVID-2026-R0220 | OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.apply (CVE-2026-25593) | Advisory | 2026-02-06 |
| AVID-2026-R0221 | OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust (CVE-2026-26316) | Advisory | 2026-02-19 |
| AVID-2026-R0222 | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints (CVE-2026-26317) | Advisory | 2026-02-19 |
| AVID-2026-R0223 | OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests (CVE-2026-26319) | Advisory | 2026-02-19 |
| AVID-2026-R0224 | OpenClaw macOS deep link confirmation truncation can conceal executed agent message (CVE-2026-26320) | Advisory | 2026-02-19 |
| AVID-2026-R0225 | OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension (CVE-2026-26321) | Advisory | 2026-02-19 |
| AVID-2026-R0226 | OpenClaw Gateway tool allowed unrestricted gatewayUrl override (CVE-2026-26322) | Advisory | 2026-02-19 |
| AVID-2026-R0227 | OpenClaw has a command injection in maintainer clawtributors updater (CVE-2026-26323) | Advisory | 2026-02-19 |
| AVID-2026-R0228 | OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable) (CVE-2026-26324) | Advisory | 2026-02-19 |
| AVID-2026-R0229 | OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals (CVE-2026-26325) | Advisory | 2026-02-19 |
| AVID-2026-R0230 | OpenClaw skills.status could leak secrets to operator.read clients (CVE-2026-26326) | Advisory | 2026-02-19 |
| AVID-2026-R0231 | OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning (CVE-2026-26327) | Advisory | 2026-02-19 |
| AVID-2026-R0232 | OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities (CVE-2026-26328) | Advisory | 2026-02-19 |
| AVID-2026-R0233 | OpenClaw has a path traversal in browser upload allows local file read (CVE-2026-26329) | Advisory | 2026-02-19 |
| AVID-2026-R0234 | OpenClaw has a Path Traversal in Browser Download Functionality (CVE-2026-26972) | Advisory | 2026-02-19 |
| AVID-2026-R0235 | OpenClaw: Unsanitized CWD path injection into LLM prompts (CVE-2026-27001) | Advisory | 2026-02-19 |
| AVID-2026-R0236 | OpenClaw: Docker container escape via unvalidated bind mount config injection (CVE-2026-27002) | Advisory | 2026-02-19 |
| AVID-2026-R0237 | OpenClaw: Telegram bot token exposure via logs (CVE-2026-27003) | Advisory | 2026-02-19 |
| AVID-2026-R0238 | OpenClaw session tool visibility hardening and Telegram webhook secret fallback (CVE-2026-27004) | Advisory | 2026-02-19 |
| AVID-2026-R0239 | OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container recreation (CVE-2026-27007) | Advisory | 2026-02-19 |
| AVID-2026-R0240 | OpenClaw hardened the skill download target directory validation (CVE-2026-27008) | Advisory | 2026-02-19 |
| AVID-2026-R0241 | OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection (CVE-2026-27009) | Advisory | 2026-02-19 |
| AVID-2026-R0242 | OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flows (CVE-2026-27484) | Advisory | 2026-02-21 |
| AVID-2026-R0243 | OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection (CVE-2026-27485) | Advisory | 2026-02-21 |
| AVID-2026-R0244 | OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup (CVE-2026-27486) | Advisory | 2026-02-21 |
| AVID-2026-R0245 | OpenClaw: Prevent shell injection in macOS keychain credential write (CVE-2026-27487) | Advisory | 2026-02-21 |
| AVID-2026-R0246 | OpenClaw hardened cron webhook delivery against SSRF (CVE-2026-27488) | Advisory | 2026-02-21 |
| AVID-2026-R0247 | OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs (CVE-2026-27576) | Advisory | 2026-02-21 |
| AVID-2026-R0248 | Misconfigured database exposes sensitive API keys | Advisory | 2026-03-04 |
| AVID-2026-R0249 | Exposed ClickHouse database leaking sensitive information | Issue | 2026-03-04 |
| AVID-2026-R0250 | Critical authentication bypass vulnerability in Base44 | Advisory | 2026-03-04 |
| AVID-2026-R0251 | Data exfiltration via prompt injection | Issue | 2026-03-04 |
| AVID-2026-R0253 | Dia: Increased Spoof Risk; Missing full screen toast (CVE-2025-13132) | Advisory | 2025-11-21 |
| AVID-2026-R0254 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`. | Measurement | 2026-03-10 |
| AVID-2026-R0255 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`. | Measurement | 2026-03-10 |
| AVID-2026-R0256 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`. | Measurement | 2026-03-10 |
| AVID-2026-R0257 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`. | Measurement | 2026-03-10 |
| AVID-2026-R0258 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`. | Measurement | 2026-03-10 |
| AVID-2026-R0259 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`. | Measurement | 2026-03-10 |
| AVID-2026-R0260 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`. | Measurement | 2026-03-10 |
| AVID-2026-R0261 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`. | Measurement | 2026-03-10 |
| AVID-2026-R0262 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`. | Measurement | 2026-03-10 |
| AVID-2026-R0263 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`. | Measurement | 2026-03-10 |
| AVID-2026-R0264 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`. | Measurement | 2026-03-10 |
| AVID-2026-R0265 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`. | Measurement | 2026-03-10 |
| AVID-2026-R0266 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`. | Measurement | 2026-03-10 |
| AVID-2026-R0267 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`. | Measurement | 2026-03-10 |
| AVID-2026-R0268 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`. | Measurement | 2026-03-10 |
| AVID-2026-R0269 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`. | Measurement | 2026-03-10 |
| AVID-2026-R0270 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`. | Measurement | 2026-03-10 |
| AVID-2026-R0271 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`. | Measurement | 2026-03-10 |
| AVID-2026-R0272 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`. | Measurement | 2026-03-10 |
| AVID-2026-R0273 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`. | Measurement | 2026-03-10 |
| AVID-2026-R0274 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`. | Measurement | 2026-03-10 |
| AVID-2026-R0275 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`. | Measurement | 2026-03-10 |
| AVID-2026-R0276 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`. | Measurement | 2026-03-10 |
| AVID-2026-R0277 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`. | Measurement | 2026-03-10 |
| AVID-2026-R0278 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`. | Measurement | 2026-03-10 |
| AVID-2026-R0279 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`. | Measurement | 2026-03-10 |
| AVID-2026-R0280 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`. | Measurement | 2026-03-10 |
| AVID-2026-R0281 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`. | Measurement | 2026-03-10 |
| AVID-2026-R0282 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`. | Measurement | 2026-03-10 |
| AVID-2026-R0283 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`. | Measurement | 2026-03-10 |
| AVID-2026-R0284 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`. | Measurement | 2026-03-10 |
| AVID-2026-R0285 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`. | Measurement | 2026-03-10 |
| AVID-2026-R0286 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`. | Measurement | 2026-03-10 |
| AVID-2026-R0287 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`. | Measurement | 2026-03-10 |
| AVID-2026-R0288 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`. | Measurement | 2026-03-10 |
| AVID-2026-R0289 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`. | Measurement | 2026-03-10 |
| AVID-2026-R0290 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`. | Measurement | 2026-03-10 |
| AVID-2026-R0291 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`. | Measurement | 2026-03-10 |
| AVID-2026-R0292 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`. | Measurement | 2026-03-10 |
| AVID-2026-R0293 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`. | Measurement | 2026-03-10 |
| AVID-2026-R0294 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`. | Measurement | 2026-03-10 |
| AVID-2026-R0295 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`. | Measurement | 2026-03-10 |
| AVID-2026-R0296 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`. | Measurement | 2026-03-10 |
| AVID-2026-R0297 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`. | Measurement | 2026-03-10 |
| AVID-2026-R0298 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`. | Measurement | 2026-03-10 |
| AVID-2026-R0299 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`. | Measurement | 2026-03-10 |
| AVID-2026-R0300 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`. | Measurement | 2026-03-10 |
| AVID-2026-R0301 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`. | Measurement | 2026-03-10 |
| AVID-2026-R0302 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`. | Measurement | 2026-03-10 |
| AVID-2026-R0303 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`. | Measurement | 2026-03-10 |
| AVID-2026-R0304 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`. | Measurement | 2026-03-10 |
| AVID-2026-R0305 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`. | Measurement | 2026-03-10 |
| AVID-2026-R0306 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`. | Measurement | 2026-03-10 |
| AVID-2026-R0307 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`. | Measurement | 2026-03-10 |
| AVID-2026-R0308 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`. | Measurement | 2026-03-10 |
| AVID-2026-R0309 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`. | Measurement | 2026-03-10 |
| AVID-2026-R0310 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`. | Measurement | 2026-03-10 |
| AVID-2026-R0311 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`. | Measurement | 2026-03-10 |
| AVID-2026-R0312 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`. | Measurement | 2026-03-10 |
| AVID-2026-R0313 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`. | Measurement | 2026-03-10 |
| AVID-2026-R0314 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`. | Measurement | 2026-03-10 |
| AVID-2026-R0315 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`. | Measurement | 2026-03-10 |
| AVID-2026-R0316 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`. | Measurement | 2026-03-10 |
| AVID-2026-R0317 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`. | Measurement | 2026-03-10 |
| AVID-2026-R0318 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`. | Measurement | 2026-03-10 |
| AVID-2026-R0319 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`. | Measurement | 2026-03-10 |
| AVID-2026-R0320 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`. | Measurement | 2026-03-10 |
| AVID-2026-R0321 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`. | Measurement | 2026-03-10 |
| AVID-2026-R0322 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`. | Measurement | 2026-03-10 |
| AVID-2026-R0323 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`. | Measurement | 2026-03-10 |
| AVID-2026-R0324 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`. | Measurement | 2026-03-10 |
| AVID-2026-R0325 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`. | Measurement | 2026-03-10 |
| AVID-2026-R0326 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`. | Measurement | 2026-03-10 |
| AVID-2026-R0327 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`. | Measurement | 2026-03-10 |
| AVID-2026-R0328 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`. | Measurement | 2026-03-10 |
| AVID-2026-R0329 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0330 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0331 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0332 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0333 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0334 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0335 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0336 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0337 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`. | Measurement | 2026-03-10 |
| AVID-2026-R0338 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`. | Measurement | 2026-03-10 |
| AVID-2026-R0339 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`. | Measurement | 2026-03-10 |
| AVID-2026-R0340 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`. | Measurement | 2026-03-10 |
| AVID-2026-R0341 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`. | Measurement | 2026-03-10 |
| AVID-2026-R0342 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`. | Measurement | 2026-03-10 |
| AVID-2026-R0343 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`. | Measurement | 2026-03-10 |
| AVID-2026-R0344 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`. | Measurement | 2026-03-10 |
| AVID-2026-R0345 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`. | Measurement | 2026-03-10 |
| AVID-2026-R0346 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`. | Measurement | 2026-03-10 |
| AVID-2026-R0347 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`. | Measurement | 2026-03-10 |
| AVID-2026-R0348 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`. | Measurement | 2026-03-10 |
| AVID-2026-R0349 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`. | Measurement | 2026-03-10 |
| AVID-2026-R0350 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`. | Measurement | 2026-03-10 |
| AVID-2026-R0351 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`. | Measurement | 2026-03-10 |
| AVID-2026-R0352 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`. | Measurement | 2026-03-10 |
| AVID-2026-R0353 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`. | Measurement | 2026-03-10 |
| AVID-2026-R0354 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`. | Measurement | 2026-03-10 |
| AVID-2026-R0355 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`. | Measurement | 2026-03-10 |
| AVID-2026-R0356 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`. | Measurement | 2026-03-10 |
| AVID-2026-R0357 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`. | Measurement | 2026-03-10 |
| AVID-2026-R0358 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`. | Measurement | 2026-03-10 |
| AVID-2026-R0359 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`. | Measurement | 2026-03-10 |
| AVID-2026-R0360 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`. | Measurement | 2026-03-10 |
| AVID-2026-R0361 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`. | Measurement | 2026-03-10 |
| AVID-2026-R0362 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`. | Measurement | 2026-03-10 |
| AVID-2026-R0363 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`. | Measurement | 2026-03-10 |
| AVID-2026-R0364 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`. | Measurement | 2026-03-10 |
| AVID-2026-R0365 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`. | Measurement | 2026-03-10 |
| AVID-2026-R0366 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`. | Measurement | 2026-03-10 |
| AVID-2026-R0367 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`. | Measurement | 2026-03-10 |
| AVID-2026-R0368 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`. | Measurement | 2026-03-10 |
| AVID-2026-R0369 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`. | Measurement | 2026-03-10 |
| AVID-2026-R0370 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`. | Measurement | 2026-03-10 |
| AVID-2026-R0371 | The model gpt-oss-20b from OpenAI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`. | Measurement | 2026-03-10 |
| AVID-2026-R0372 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`. | Measurement | 2026-03-10 |
| AVID-2026-R0373 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0374 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0375 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0376 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0377 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0378 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0379 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`. | Measurement | 2026-03-10 |
| AVID-2026-R0380 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`. | Measurement | 2026-03-10 |
| AVID-2026-R0381 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`. | Measurement | 2026-03-10 |
| AVID-2026-R0382 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`. | Measurement | 2026-03-10 |
| AVID-2026-R0383 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`. | Measurement | 2026-03-10 |
| AVID-2026-R0384 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`. | Measurement | 2026-03-10 |
| AVID-2026-R0385 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`. | Measurement | 2026-03-10 |
| AVID-2026-R0386 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`. | Measurement | 2026-03-10 |
| AVID-2026-R0387 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`. | Measurement | 2026-03-10 |
| AVID-2026-R0388 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`. | Measurement | 2026-03-10 |
| AVID-2026-R0389 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`. | Measurement | 2026-03-10 |
| AVID-2026-R0390 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`. | Measurement | 2026-03-10 |
| AVID-2026-R0391 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`. | Measurement | 2026-03-10 |
| AVID-2026-R0392 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`. | Measurement | 2026-03-10 |
| AVID-2026-R0393 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`. | Measurement | 2026-03-10 |
| AVID-2026-R0394 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`. | Measurement | 2026-03-10 |
| AVID-2026-R0395 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`. | Measurement | 2026-03-10 |
| AVID-2026-R0396 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`. | Measurement | 2026-03-10 |
| AVID-2026-R0397 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`. | Measurement | 2026-03-10 |
| AVID-2026-R0398 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`. | Measurement | 2026-03-10 |
| AVID-2026-R0399 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`. | Measurement | 2026-03-10 |
| AVID-2026-R0400 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`. | Measurement | 2026-03-10 |
| AVID-2026-R0401 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`. | Measurement | 2026-03-10 |
| AVID-2026-R0402 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`. | Measurement | 2026-03-10 |
| AVID-2026-R0403 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`. | Measurement | 2026-03-10 |
| AVID-2026-R0404 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`. | Measurement | 2026-03-10 |
| AVID-2026-R0405 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`. | Measurement | 2026-03-10 |
| AVID-2026-R0406 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`. | Measurement | 2026-03-10 |
| AVID-2026-R0407 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`. | Measurement | 2026-03-10 |
| AVID-2026-R0408 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`. | Measurement | 2026-03-10 |
| AVID-2026-R0409 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`. | Measurement | 2026-03-10 |
| AVID-2026-R0410 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`. | Measurement | 2026-03-10 |
| AVID-2026-R0411 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`. | Measurement | 2026-03-10 |
| AVID-2026-R0412 | The model Mistral-Small-24B-Instruct-2501 from Mistral was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`. | Measurement | 2026-03-10 |
| AVID-2026-R0413 | OpenAI ChatGPT Content Safety Explicit Image Bypass | Advisory | 2026-01-28 |
| AVID-2026-R0414 | Eclipse Theia IDE MCP Configuration Code Execution | Advisory | 2025-11-18 |
| AVID-2026-R0415 | OpenAI Codex CLI Notify Field Configuration Remote Code Execution | Advisory | 2026-01-16 |
| AVID-2026-R0416 | OpenAI Codex CLI Model Provider Configuration Remote Code Execution | Advisory | 2026-01-16 |
| AVID-2026-R0417 | OpenAI Codex CLI MCP Configuration Remote Code Execution | Advisory | 2026-01-19 |
| AVID-2026-R0418 | Amazon Kiro IDE Data Exfiltration via Filename Prompt Injection and Kiro Powers Registry Fetching | Advisory | 2025-12-11 |
| AVID-2026-R0419 | Amazon Kiro IDE Data Exfiltration via Steering File | Advisory | 2025-12-08 |
| AVID-2026-R0420 | Google Gemini CLI Tool Discovery Code Execution | Advisory | 2025-12-26 |
| AVID-2026-R0421 | Google Gemini CLI MCP Configuration Code Execution | Advisory | 2025-12-26 |
| AVID-2026-R0422 | JetBrains Junie AI Coding Agent guidelines.md Code Execution | Advisory | 2025-11-14 |
| AVID-2026-R0423 | TheLibrarian.io Internal Cloud Environment Access via web_fetch Tool | Advisory | 2025-10-10 |
| AVID-2026-R0424 | Zed IDE LSP Configuration Code Execution | Advisory | 2025-11-16 |
| AVID-2026-R0425 | Zed IDE MCP Configuration Code Execution | Advisory | 2025-11-16 |
| AVID-2026-R0426 | Google Antigravity IDE Persistent Code Execution | Advisory | 2025-11-19 |
| AVID-2026-R0427 | Cline Bot AI Coding Agent Code Execution via Prompt Injection and TOCTOU Script Invocation | Advisory | 2025-08-27 |
| AVID-2026-R0428 | Cline Bot AI Coding Agent Code Execution via Prompt Injection and .clinerules Directives | Advisory | 2025-08-27 |
| AVID-2026-R0429 | Cline Bot AI Coding Agent Data Exfiltration via Prompt Injection and DNS | Advisory | 2025-08-27 |
| AVID-2026-R0430 | Nvidia NemoGuard Jailbreak Detect Guardrail Evasion | Advisory | 2025-03-11 |
| AVID-2026-R0431 | Protect AI Jailbreak and Prompt Injection Guardrail Evasion | Advisory | 2025-03-12 |
| AVID-2026-R0432 | Vijil Prompt Injection Guardrail Evasion | Advisory | 2025-03-14 |
| AVID-2026-R0433 | Meta Prompt Guard Guardrail Evasion | Advisory | 2025-03-11 |
| AVID-2026-R0434 | Microsoft Azure Prompt Shield Guardrail Evasion | Advisory | 2024-06-06 |
| AVID-2026-R0435 | Microsoft Azure AI Content Safety Guardrail Evasion | Advisory | 2024-03-04 |
| AVID-2026-R0436 | Mistral Vibe CLI MCP Configuration Code Execution | Advisory | 2025-12-11 |
| AVID-2026-R0437 | Mistral Vibe CLI Shell Expansion Command Execution | Advisory | 2026-01-02 |
| AVID-2026-R0438 | Mistral Vibe CLI Python Tools Code Execution | Advisory | 2025-12-12 |
| AVID-2026-R0439 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`. | Measurement | 2026-03-17 |
| AVID-2026-R0440 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`. | Measurement | 2026-03-17 |
| AVID-2026-R0441 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`. | Measurement | 2026-03-17 |
| AVID-2026-R0442 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`. | Measurement | 2026-03-17 |
| AVID-2026-R0443 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`. | Measurement | 2026-03-17 |
| AVID-2026-R0444 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`. | Measurement | 2026-03-17 |
| AVID-2026-R0445 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`. | Measurement | 2026-03-17 |
| AVID-2026-R0446 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`. | Measurement | 2026-03-17 |
| AVID-2026-R0447 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`. | Measurement | 2026-03-17 |
| AVID-2026-R0448 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`. | Measurement | 2026-03-17 |
| AVID-2026-R0449 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`. | Measurement | 2026-03-17 |
| AVID-2026-R0450 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`. | Measurement | 2026-03-17 |
| AVID-2026-R0451 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`. | Measurement | 2026-03-17 |
| AVID-2026-R0452 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`. | Measurement | 2026-03-16 |
| AVID-2026-R0453 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`. | Measurement | 2026-03-16 |
| AVID-2026-R0454 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`. | Measurement | 2026-03-16 |
| AVID-2026-R0455 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`. | Measurement | 2026-03-16 |
| AVID-2026-R0456 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`. | Measurement | 2026-03-16 |
| AVID-2026-R0457 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`. | Measurement | 2026-03-16 |
| AVID-2026-R0458 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`. | Measurement | 2026-03-16 |
| AVID-2026-R0459 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`. | Measurement | 2026-03-16 |
| AVID-2026-R0460 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`. | Measurement | 2026-03-16 |
| AVID-2026-R0461 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`. | Measurement | 2026-03-16 |
| AVID-2026-R0462 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`. | Measurement | 2026-03-16 |
| AVID-2026-R0463 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`. | Measurement | 2026-03-16 |
| AVID-2026-R0464 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`. | Measurement | 2026-03-16 |
| AVID-2026-R0465 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`. | Measurement | 2026-03-16 |
| AVID-2026-R0466 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`. | Measurement | 2026-03-16 |
| AVID-2026-R0467 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`. | Measurement | 2026-03-16 |
| AVID-2026-R0468 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`. | Measurement | 2026-03-16 |
| AVID-2026-R0469 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`. | Measurement | 2026-03-16 |
| AVID-2026-R0470 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`. | Measurement | 2026-03-16 |
| AVID-2026-R0471 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`. | Measurement | 2026-03-16 |
| AVID-2026-R0472 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`. | Measurement | 2026-03-16 |
| AVID-2026-R0473 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`. | Measurement | 2026-03-16 |
| AVID-2026-R0474 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`. | Measurement | 2026-03-16 |
| AVID-2026-R0475 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`. | Measurement | 2026-03-16 |
| AVID-2026-R0476 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`. | Measurement | 2026-03-16 |
| AVID-2026-R0477 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`. | Measurement | 2026-03-16 |
| AVID-2026-R0478 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`. | Measurement | 2026-03-16 |
| AVID-2026-R0479 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`. | Measurement | 2026-03-16 |
| AVID-2026-R0480 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`. | Measurement | 2026-03-16 |
| AVID-2026-R0481 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`. | Measurement | 2026-03-16 |
| AVID-2026-R0482 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`. | Measurement | 2026-03-16 |
| AVID-2026-R0483 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`. | Measurement | 2026-03-16 |
| AVID-2026-R0484 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`. | Measurement | 2026-03-16 |
| AVID-2026-R0485 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`. | Measurement | 2026-03-16 |
| AVID-2026-R0486 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`. | Measurement | 2026-03-16 |
| AVID-2026-R0487 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`. | Measurement | 2026-03-16 |
| AVID-2026-R0488 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`. | Measurement | 2026-03-16 |
| AVID-2026-R0489 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`. | Measurement | 2026-03-16 |
| AVID-2026-R0490 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`. | Measurement | 2026-03-16 |
| AVID-2026-R0491 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`. | Measurement | 2026-03-16 |
| AVID-2026-R0492 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`. | Measurement | 2026-03-16 |
| AVID-2026-R0493 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`. | Measurement | 2026-03-16 |
| AVID-2026-R0494 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`. | Measurement | 2026-03-16 |
| AVID-2026-R0495 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`. | Measurement | 2026-03-16 |
| AVID-2026-R0496 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`. | Measurement | 2026-03-16 |
| AVID-2026-R0497 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`. | Measurement | 2026-03-16 |
| AVID-2026-R0498 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`. | Measurement | 2026-03-16 |
| AVID-2026-R0499 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`. | Measurement | 2026-03-16 |
| AVID-2026-R0500 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`. | Measurement | 2026-03-16 |
| AVID-2026-R0501 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`. | Measurement | 2026-03-16 |
| AVID-2026-R0502 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`. | Measurement | 2026-03-16 |
| AVID-2026-R0503 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`. | Measurement | 2026-03-16 |
| AVID-2026-R0504 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`. | Measurement | 2026-03-16 |
| AVID-2026-R0505 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`. | Measurement | 2026-03-16 |
| AVID-2026-R0506 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`. | Measurement | 2026-03-16 |
| AVID-2026-R0507 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`. | Measurement | 2026-03-16 |
| AVID-2026-R0508 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`. | Measurement | 2026-03-16 |
| AVID-2026-R0509 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`. | Measurement | 2026-03-16 |
| AVID-2026-R0510 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`. | Measurement | 2026-03-16 |
| AVID-2026-R0511 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`. | Measurement | 2026-03-16 |
| AVID-2026-R0512 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`. | Measurement | 2026-03-16 |
| AVID-2026-R0513 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`. | Measurement | 2026-03-16 |
| AVID-2026-R0514 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`. | Measurement | 2026-03-16 |
| AVID-2026-R0515 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`. | Measurement | 2026-03-16 |
| AVID-2026-R0516 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`. | Measurement | 2026-03-16 |
| AVID-2026-R0517 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`. | Measurement | 2026-03-16 |
| AVID-2026-R0518 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`. | Measurement | 2026-03-16 |
| AVID-2026-R0519 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`. | Measurement | 2026-03-16 |
| AVID-2026-R0520 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`. | Measurement | 2026-03-16 |
| AVID-2026-R0521 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`. | Measurement | 2026-03-16 |
| AVID-2026-R0522 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`. | Measurement | 2026-03-16 |
| AVID-2026-R0523 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`. | Measurement | 2026-03-16 |
| AVID-2026-R0524 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`. | Measurement | 2026-03-16 |
| AVID-2026-R0525 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`. | Measurement | 2026-03-16 |
| AVID-2026-R0526 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`. | Measurement | 2026-03-16 |
| AVID-2026-R0527 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`. | Measurement | 2026-03-16 |
| AVID-2026-R0528 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`. | Measurement | 2026-03-16 |
| AVID-2026-R0529 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`. | Measurement | 2026-03-16 |
| AVID-2026-R0530 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`. | Measurement | 2026-03-16 |
| AVID-2026-R0531 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`. | Measurement | 2026-03-16 |
| AVID-2026-R0532 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`. | Measurement | 2026-03-16 |
| AVID-2026-R0533 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`. | Measurement | 2026-03-16 |
| AVID-2026-R0534 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`. | Measurement | 2026-03-16 |
| AVID-2026-R0535 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`. | Measurement | 2026-03-16 |
| AVID-2026-R0536 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`. | Measurement | 2026-03-16 |
| AVID-2026-R0537 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`. | Measurement | 2026-03-16 |
| AVID-2026-R0538 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`. | Measurement | 2026-03-16 |
| AVID-2026-R0539 | The model gemma-3n-E4B-it from Google was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`. | Measurement | 2026-03-16 |
| AVID-2026-R0540 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`. | Measurement | 2026-03-16 |
| AVID-2026-R0541 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`. | Measurement | 2026-03-16 |
| AVID-2026-R0542 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`. | Measurement | 2026-03-16 |
| AVID-2026-R0543 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`. | Measurement | 2026-03-16 |
| AVID-2026-R0544 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`. | Measurement | 2026-03-16 |
| AVID-2026-R0545 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`. | Measurement | 2026-03-16 |
| AVID-2026-R0546 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`. | Measurement | 2026-03-16 |
| AVID-2026-R0547 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`. | Measurement | 2026-03-16 |
| AVID-2026-R0548 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`. | Measurement | 2026-03-16 |
| AVID-2026-R0549 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`. | Measurement | 2026-03-16 |
| AVID-2026-R0550 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`. | Measurement | 2026-03-16 |
| AVID-2026-R0551 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`. | Measurement | 2026-03-16 |
| AVID-2026-R0552 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`. | Measurement | 2026-03-16 |
| AVID-2026-R0553 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`. | Measurement | 2026-03-16 |
| AVID-2026-R0554 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`. | Measurement | 2026-03-16 |
| AVID-2026-R0555 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`. | Measurement | 2026-03-16 |
| AVID-2026-R0556 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`. | Measurement | 2026-03-16 |
| AVID-2026-R0557 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`. | Measurement | 2026-03-16 |
| AVID-2026-R0558 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`. | Measurement | 2026-03-16 |
| AVID-2026-R0559 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`. | Measurement | 2026-03-16 |
| AVID-2026-R0560 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`. | Measurement | 2026-03-16 |
| AVID-2026-R0561 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`. | Measurement | 2026-03-16 |
| AVID-2026-R0562 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`. | Measurement | 2026-03-16 |
| AVID-2026-R0563 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`. | Measurement | 2026-03-16 |
| AVID-2026-R0564 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`. | Measurement | 2026-03-16 |
| AVID-2026-R0565 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`. | Measurement | 2026-03-16 |
| AVID-2026-R0566 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`. | Measurement | 2026-03-16 |
| AVID-2026-R0567 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`. | Measurement | 2026-03-16 |
| AVID-2026-R0568 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`. | Measurement | 2026-03-16 |
| AVID-2026-R0569 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`. | Measurement | 2026-03-16 |
| AVID-2026-R0570 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`. | Measurement | 2026-03-16 |
| AVID-2026-R0571 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`. | Measurement | 2026-03-16 |
| AVID-2026-R0572 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`. | Measurement | 2026-03-16 |
| AVID-2026-R0573 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`. | Measurement | 2026-03-16 |
| AVID-2026-R0574 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`. | Measurement | 2026-03-16 |
| AVID-2026-R0575 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`. | Measurement | 2026-03-16 |
| AVID-2026-R0576 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`. | Measurement | 2026-03-16 |
| AVID-2026-R0577 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`. | Measurement | 2026-03-16 |
| AVID-2026-R0578 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`. | Measurement | 2026-03-16 |
| AVID-2026-R0579 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`. | Measurement | 2026-03-16 |
| AVID-2026-R0580 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`. | Measurement | 2026-03-16 |
| AVID-2026-R0581 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`. | Measurement | 2026-03-16 |
| AVID-2026-R0582 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`. | Measurement | 2026-03-16 |
| AVID-2026-R0583 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`. | Measurement | 2026-03-16 |
| AVID-2026-R0584 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`. | Measurement | 2026-03-16 |
| AVID-2026-R0585 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`. | Measurement | 2026-03-16 |
| AVID-2026-R0586 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`. | Measurement | 2026-03-16 |
| AVID-2026-R0587 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`. | Measurement | 2026-03-16 |
| AVID-2026-R0588 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`. | Measurement | 2026-03-16 |
| AVID-2026-R0589 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`. | Measurement | 2026-03-16 |
| AVID-2026-R0590 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`. | Measurement | 2026-03-16 |
| AVID-2026-R0591 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`. | Measurement | 2026-03-16 |
| AVID-2026-R0592 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`. | Measurement | 2026-03-16 |
| AVID-2026-R0593 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`. | Measurement | 2026-03-16 |
| AVID-2026-R0594 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`. | Measurement | 2026-03-16 |
| AVID-2026-R0595 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`. | Measurement | 2026-03-16 |
| AVID-2026-R0596 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`. | Measurement | 2026-03-16 |
| AVID-2026-R0597 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`. | Measurement | 2026-03-16 |
| AVID-2026-R0598 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`. | Measurement | 2026-03-16 |
| AVID-2026-R0599 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`. | Measurement | 2026-03-16 |
| AVID-2026-R0600 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`. | Measurement | 2026-03-16 |
| AVID-2026-R0601 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`. | Measurement | 2026-03-16 |
| AVID-2026-R0602 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`. | Measurement | 2026-03-16 |
| AVID-2026-R0603 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`. | Measurement | 2026-03-16 |
| AVID-2026-R0604 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`. | Measurement | 2026-03-16 |
| AVID-2026-R0605 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`. | Measurement | 2026-03-16 |
| AVID-2026-R0606 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`. | Measurement | 2026-03-16 |
| AVID-2026-R0607 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`. | Measurement | 2026-03-16 |
| AVID-2026-R0608 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`. | Measurement | 2026-03-16 |
| AVID-2026-R0609 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`. | Measurement | 2026-03-16 |
| AVID-2026-R0610 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`. | Measurement | 2026-03-16 |
| AVID-2026-R0611 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`. | Measurement | 2026-03-16 |
| AVID-2026-R0612 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`. | Measurement | 2026-03-16 |
| AVID-2026-R0613 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`. | Measurement | 2026-03-16 |
| AVID-2026-R0614 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`. | Measurement | 2026-03-16 |
| AVID-2026-R0615 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackLongPrompt`. | Measurement | 2026-03-16 |
| AVID-2026-R0616 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `snowball.GraphConnectivity`. | Measurement | 2026-03-16 |
| AVID-2026-R0617 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `suffix.GCGCached`. | Measurement | 2026-03-16 |
| AVID-2026-R0618 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `tap.TAPCached`. | Measurement | 2026-03-16 |
| AVID-2026-R0619 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `topic.WordnetControversial`. | Measurement | 2026-03-16 |
| AVID-2026-R0620 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.ColabAIDataLeakage`. | Measurement | 2026-03-16 |
| AVID-2026-R0621 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownImageExfil`. | Measurement | 2026-03-16 |
| AVID-2026-R0622 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURIImageExfilExtended`. | Measurement | 2026-03-16 |
| AVID-2026-R0623 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownURINonImageExfilExtended`. | Measurement | 2026-03-16 |
| AVID-2026-R0624 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.MarkdownXSS`. | Measurement | 2026-03-16 |
| AVID-2026-R0625 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.PlaygroundMarkdownExfil`. | Measurement | 2026-03-16 |
| AVID-2026-R0626 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.StringAssemblyDataExfil`. | Measurement | 2026-03-16 |
| AVID-2026-R0627 | The model LFM2-24B-A2B from Liquid AI was evaluated by the Garak LLM Vulnerability scanner using the probe `web_injection.TaskXSS`. | Measurement | 2026-03-16 |
| AVID-2026-R0628 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Dart`. | Measurement | 2026-03-17 |
| AVID-2026-R0629 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.JavaScript`. | Measurement | 2026-03-17 |
| AVID-2026-R0630 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Perl`. | Measurement | 2026-03-17 |
| AVID-2026-R0631 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Python`. | Measurement | 2026-03-17 |
| AVID-2026-R0632 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.RakuLand`. | Measurement | 2026-03-17 |
| AVID-2026-R0633 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Ruby`. | Measurement | 2026-03-17 |
| AVID-2026-R0634 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `packagehallucination.Rust`. | Measurement | 2026-03-17 |
| AVID-2026-R0635 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.FutureTense`. | Measurement | 2026-03-17 |
| AVID-2026-R0636 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `phrasing.PastTense`. | Measurement | 2026-03-17 |
| AVID-2026-R0637 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackHateHumans`. | Measurement | 2026-03-17 |
| AVID-2026-R0638 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `promptinject.HijackKillHumans`. | Measurement | 2026-03-17 |
| AVID-2026-R0639 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiEscaped`. | Measurement | 2026-03-17 |
| AVID-2026-R0640 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `ansiescape.AnsiRaw`. | Measurement | 2026-03-17 |
| AVID-2026-R0641 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.CompleteKey`. | Measurement | 2026-03-17 |
| AVID-2026-R0642 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `apikey.GetKey`. | Measurement | 2026-03-17 |
| AVID-2026-R0643 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `atkgen.Tox`. | Measurement | 2026-03-17 |
| AVID-2026-R0644 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `continuation.ContinueSlursReclaimedSlurs`. | Measurement | 2026-03-17 |
| AVID-2026-R0645 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.Ablation_Dan_11_0`. | Measurement | 2026-03-17 |
| AVID-2026-R0646 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.AutoDANCached`. | Measurement | 2026-03-17 |
| AVID-2026-R0647 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dan.DanInTheWild`. | Measurement | 2026-03-17 |
| AVID-2026-R0648 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.Repeat`. | Measurement | 2026-03-17 |
| AVID-2026-R0649 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `divergence.RepeatedToken`. | Measurement | 2026-03-17 |
| AVID-2026-R0650 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `dra.DRA`. | Measurement | 2026-03-17 |
| AVID-2026-R0651 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAscii85`. | Measurement | 2026-03-17 |
| AVID-2026-R0652 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectAtbash`. | Measurement | 2026-03-17 |
| AVID-2026-R0653 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase16`. | Measurement | 2026-03-17 |
| AVID-2026-R0654 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase2048`. | Measurement | 2026-03-17 |
| AVID-2026-R0655 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase32`. | Measurement | 2026-03-17 |
| AVID-2026-R0656 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBase64`. | Measurement | 2026-03-17 |
| AVID-2026-R0657 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectBraille`. | Measurement | 2026-03-17 |
| AVID-2026-R0658 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectEcoji`. | Measurement | 2026-03-17 |
| AVID-2026-R0659 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectHex`. | Measurement | 2026-03-17 |
| AVID-2026-R0660 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectMorse`. | Measurement | 2026-03-17 |
| AVID-2026-R0661 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectNato`. | Measurement | 2026-03-17 |
| AVID-2026-R0662 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectROT13`. | Measurement | 2026-03-17 |
| AVID-2026-R0663 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUU`. | Measurement | 2026-03-17 |
| AVID-2026-R0664 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectUnicodeTagChars`. | Measurement | 2026-03-17 |
| AVID-2026-R0665 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `encoding.InjectZalgo`. | Measurement | 2026-03-17 |
| AVID-2026-R0666 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.JinjaTemplatePythonInjection`. | Measurement | 2026-03-17 |
| AVID-2026-R0667 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `exploitation.SQLInjectionEcho`. | Measurement | 2026-03-17 |
| AVID-2026-R0668 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.Tag`. | Measurement | 2026-03-17 |
| AVID-2026-R0669 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.ThreatenJSON`. | Measurement | 2026-03-17 |
| AVID-2026-R0670 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `goodside.WhoIsRiley`. | Measurement | 2026-03-17 |
| AVID-2026-R0671 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Slurs`. | Measurement | 2026-03-17 |
| AVID-2026-R0672 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Substances`. | Measurement | 2026-03-17 |
| AVID-2026-R0673 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win10`. | Measurement | 2026-03-17 |
| AVID-2026-R0674 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `grandma.Win11`. | Measurement | 2026-03-17 |
| AVID-2026-R0675 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetEiffel`. | Measurement | 2026-03-17 |
| AVID-2026-R0676 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionFactSnippetLegal`. | Measurement | 2026-03-17 |
| AVID-2026-R0677 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionReport`. | Measurement | 2026-03-17 |
| AVID-2026-R0678 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionResume`. | Measurement | 2026-03-17 |
| AVID-2026-R0679 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnFr`. | Measurement | 2026-03-17 |
| AVID-2026-R0680 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentInjectionTranslationEnZh`. | Measurement | 2026-03-17 |
| AVID-2026-R0681 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentJailbreak`. | Measurement | 2026-03-17 |
| AVID-2026-R0682 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhois`. | Measurement | 2026-03-17 |
| AVID-2026-R0683 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `latentinjection.LatentWhoisSnippet`. | Measurement | 2026-03-17 |
| AVID-2026-R0684 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianCloze`. | Measurement | 2026-03-17 |
| AVID-2026-R0685 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.GuardianComplete`. | Measurement | 2026-03-17 |
| AVID-2026-R0686 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureCloze`. | Measurement | 2026-03-17 |
| AVID-2026-R0687 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.LiteratureComplete`. | Measurement | 2026-03-17 |
| AVID-2026-R0688 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTCloze`. | Measurement | 2026-03-17 |
| AVID-2026-R0689 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.NYTComplete`. | Measurement | 2026-03-17 |
| AVID-2026-R0690 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterCloze`. | Measurement | 2026-03-17 |
| AVID-2026-R0691 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `leakreplay.PotterComplete`. | Measurement | 2026-03-17 |
| AVID-2026-R0692 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Bullying`. | Measurement | 2026-03-17 |
| AVID-2026-R0693 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Deadnaming`. | Measurement | 2026-03-17 |
| AVID-2026-R0694 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.QuackMedicine`. | Measurement | 2026-03-17 |
| AVID-2026-R0695 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SexualContent`. | Measurement | 2026-03-17 |
| AVID-2026-R0696 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.Sexualisation`. | Measurement | 2026-03-17 |
| AVID-2026-R0697 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `lmrc.SlurUsage`. | Measurement | 2026-03-17 |
| AVID-2026-R0698 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Evasion`. | Measurement | 2026-03-17 |
| AVID-2026-R0699 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.Payload`. | Measurement | 2026-03-17 |
| AVID-2026-R0700 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.SubFunctions`. | Measurement | 2026-03-17 |
| AVID-2026-R0701 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `malwaregen.TopLevel`. | Measurement | 2026-03-17 |
| AVID-2026-R0702 | The model rnj-1-instruct from Essential AI was evaluated by the Garak LLM Vulnerability scanner using the probe `misleading.FalseAssertion`. | Measurement | 2026-03-17 |
| AVID-2026-R0703 | Evaluation of the AI system gpt-5-nano on the bbq benchmark using Inspect Evals | Measurement | 2026-03-11 |
| AVID-2026-R0704 | Evaluation of the LLM MiniMax-M2.5 on the bbq benchmark using Inspect Evals | Measurement | 2026-03-17 |
| AVID-2026-R0705 | Evaluation of the LLM gpt-oss-20b on the bbq benchmark using Inspect Evals | Measurement | 2026-03-17 |
| AVID-2026-R0706 | Evaluation of the LLM gemma-3n-E4B-it on the bbq benchmark using Inspect Evals | Measurement | 2026-03-17 |
| AVID-2026-R0707 | Evaluation of the LLM LFM2-24B-A2B on the bbq benchmark using Inspect Evals | Measurement | 2026-03-17 |
| AVID-2026-R0708 | Evaluation of the LLM rnj-1-instruct on the bbq benchmark using Inspect Evals | Measurement | 2026-03-17 |
| AVID-2026-R0709 | Evaluation of the LLM rnj-1-instruct on the bold benchmark using Inspect Evals | Measurement | 2026-03-17 |
| AVID-2026-R0710 | Vulnerability CVE-2021-1114 | Advisory | 2021-08-11 |
| AVID-2026-R0711 | Bot Framework SDK Information Disclosure Vulnerability (CVE-2021-1725) | Advisory | 2021-01-12 |
| AVID-2026-R0712 | MongoDB Node.js client side field level encryption library may not be validating KMS certificate (CVE-2021-20327) | Advisory | 2021-02-25 |
| AVID-2026-R0713 | Vulnerability CVE-2021-20486 | Advisory | 2021-05-26 |
| AVID-2026-R0714 | Vulnerability CVE-2021-2138 | Advisory | 2021-03-03 |
| AVID-2026-R0715 | Vulnerability CVE-2021-21605 | Advisory | 2021-01-13 |
| AVID-2026-R0716 | Vulnerability CVE-2021-21677 | Advisory | 2021-08-31 |
| AVID-2026-R0717 | Vulnerability CVE-2021-22205 | Advisory | 2021-04-23 |
| AVID-2026-R0718 | Denial of Service of protobuf-java parsing procedure (CVE-2021-22569) | Advisory | 2022-01-07 |
| AVID-2026-R0719 | Deserialization of Untrusted Data (CVE-2021-23338) | Advisory | 2021-02-15 |
| AVID-2026-R0720 | Authenticated users can override system configurations in their requests which allows them to execute arbitrary code. (CVE-2021-25646) | Advisory | 2021-01-29 |
| AVID-2026-R0721 | Apache Airflow: Lineage API endpoint for Experimental API missed authentication check (CVE-2021-26697) | Advisory | 2021-02-17 |
| AVID-2026-R0722 | Apache Druid Authenticated users can execute arbitrary code from malicious MySQL database systems. (CVE-2021-26919) | Advisory | 2021-03-30 |
| AVID-2026-R0723 | TIBCO Spotfire Windows Platform Artifact Search vulnerability (CVE-2021-28830) | Advisory | 2021-06-29 |
| AVID-2026-R0724 | Heap buffer overflow in `RaggedBinCount` (CVE-2021-29512) | Advisory | 2021-05-14 |
| AVID-2026-R0725 | Type confusion during tensor casts lead to dereferencing null pointers (CVE-2021-29513) | Advisory | 2021-05-14 |
| AVID-2026-R0726 | Heap out of bounds write in `RaggedBinCount` (CVE-2021-29514) | Advisory | 2021-05-14 |
| AVID-2026-R0727 | Reference binding to null pointer in `MatrixDiag*` ops (CVE-2021-29515) | Advisory | 2021-05-14 |
| AVID-2026-R0728 | Null pointer dereference via invalid Ragged Tensors (CVE-2021-29516) | Advisory | 2021-05-14 |
| AVID-2026-R0729 | Division by zero in `Conv3D` (CVE-2021-29517) | Advisory | 2021-05-14 |
| AVID-2026-R0730 | Session operations in eager mode lead to null pointer dereferences (CVE-2021-29518) | Advisory | 2021-05-14 |
| AVID-2026-R0731 | CHECK-fail in SparseCross due to type confusion (CVE-2021-29519) | Advisory | 2021-05-14 |
| AVID-2026-R0732 | Heap buffer overflow in `Conv3DBackprop*` (CVE-2021-29520) | Advisory | 2021-05-14 |
| AVID-2026-R0733 | Segfault in SparseCountSparseOutput (CVE-2021-29521) | Advisory | 2021-05-14 |
| AVID-2026-R0734 | Division by 0 in `Conv3DBackprop*` (CVE-2021-29522) | Advisory | 2021-05-14 |
| AVID-2026-R0735 | CHECK-fail in AddManySparseToTensorsMap (CVE-2021-29523) | Advisory | 2021-05-14 |
| AVID-2026-R0736 | Division by 0 in `Conv2DBackpropInput` (CVE-2021-29525) | Advisory | 2021-05-14 |
| AVID-2026-R0737 | Heap buffer overflow caused by rounding (CVE-2021-29529) | Advisory | 2021-05-14 |
| AVID-2026-R0738 | Invalid validation in `SparseMatrixSparseCholesky` (CVE-2021-29530) | Advisory | 2021-05-14 |
| AVID-2026-R0739 | CHECK-fail in tf.raw_ops.EncodePng (CVE-2021-29531) | Advisory | 2021-05-14 |
| AVID-2026-R0740 | Heap out of bounds read in `RaggedCross` (CVE-2021-29532) | Advisory | 2021-05-14 |
| AVID-2026-R0741 | CHECK-fail in DrawBoundingBoxes (CVE-2021-29533) | Advisory | 2021-05-14 |
| AVID-2026-R0742 | CHECK-fail in SparseConcat (CVE-2021-29534) | Advisory | 2021-05-14 |
| AVID-2026-R0743 | Heap buffer overflow in `QuantizedMul` (CVE-2021-29535) | Advisory | 2021-05-14 |
| AVID-2026-R0744 | Heap buffer overflow in `QuantizedReshape` (CVE-2021-29536) | Advisory | 2021-05-14 |
| AVID-2026-R0745 | Heap buffer overflow in `QuantizedResizeBilinear` (CVE-2021-29537) | Advisory | 2021-05-14 |
| AVID-2026-R0746 | Division by zero in `Conv2DBackpropFilter` (CVE-2021-29538) | Advisory | 2021-05-14 |
| AVID-2026-R0747 | Segfault in tf.raw_ops.ImmutableConst (CVE-2021-29539) | Advisory | 2021-05-14 |
| AVID-2026-R0748 | Heap buffer overflow in `Conv2DBackpropFilter` (CVE-2021-29540) | Advisory | 2021-05-14 |
| AVID-2026-R0749 | Null pointer dereference in `StringNGrams` (CVE-2021-29541) | Advisory | 2021-05-14 |
| AVID-2026-R0750 | Heap buffer overflow in `StringNGrams` (CVE-2021-29542) | Advisory | 2021-05-14 |
| AVID-2026-R0751 | CHECK-fail in `CTCGreedyDecoder` (CVE-2021-29543) | Advisory | 2021-05-14 |
| AVID-2026-R0752 | CHECK-fail in `QuantizeAndDequantizeV4Grad` (CVE-2021-29544) | Advisory | 2021-05-14 |
| AVID-2026-R0753 | Heap buffer overflow in `SparseTensorToCSRSparseMatrix` (CVE-2021-29545) | Advisory | 2021-05-14 |
| AVID-2026-R0754 | Division by 0 in `QuantizedBiasAdd` (CVE-2021-29546) | Advisory | 2021-05-14 |
| AVID-2026-R0755 | Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization` (CVE-2021-29547) | Advisory | 2021-05-14 |
| AVID-2026-R0756 | Division by 0 in `QuantizedBatchNormWithGlobalNormalization` (CVE-2021-29548) | Advisory | 2021-05-14 |
| AVID-2026-R0757 | Division by 0 in `QuantizedAdd` (CVE-2021-29549) | Advisory | 2021-05-14 |
| AVID-2026-R0758 | OOB read in `MatrixTriangularSolve` (CVE-2021-29551) | Advisory | 2021-05-14 |
| AVID-2026-R0759 | Heap OOB in `QuantizeAndDequantizeV3` (CVE-2021-29553) | Advisory | 2021-05-14 |
| AVID-2026-R0760 | Division by 0 in `DenseCountSparseOutput` (CVE-2021-29554) | Advisory | 2021-05-14 |
| AVID-2026-R0761 | Division by 0 in `FusedBatchNorm` (CVE-2021-29555) | Advisory | 2021-05-14 |
| AVID-2026-R0762 | Division by 0 in `SparseMatMul` (CVE-2021-29557) | Advisory | 2021-05-14 |
| AVID-2026-R0763 | Heap buffer overflow in `SparseSplit` (CVE-2021-29558) | Advisory | 2021-05-14 |
| AVID-2026-R0764 | Heap OOB access in unicode ops (CVE-2021-29559) | Advisory | 2021-05-14 |
| AVID-2026-R0765 | Heap buffer overflow in `RaggedTensorToTensor` (CVE-2021-29560) | Advisory | 2021-05-14 |
| AVID-2026-R0766 | CHECK-fail in `LoadAndRemapMatrix` (CVE-2021-29561) | Advisory | 2021-05-14 |
| AVID-2026-R0767 | CHECK-fail in `tf.raw_ops.IRFFT` (CVE-2021-29562) | Advisory | 2021-05-14 |
| AVID-2026-R0768 | CHECK-fail in `tf.raw_ops.RFFT` (CVE-2021-29563) | Advisory | 2021-05-14 |
| AVID-2026-R0769 | Null pointer dereference in `EditDistance` (CVE-2021-29564) | Advisory | 2021-05-14 |
| AVID-2026-R0770 | Null pointer dereference in `SparseFillEmptyRows` (CVE-2021-29565) | Advisory | 2021-05-14 |
| AVID-2026-R0771 | Heap OOB access in `Dilation2DBackpropInput` (CVE-2021-29566) | Advisory | 2021-05-14 |
| AVID-2026-R0772 | Lack of validation in `SparseDenseCwiseMul` (CVE-2021-29567) | Advisory | 2021-05-14 |
| AVID-2026-R0773 | Reference binding to null in `ParameterizedTruncatedNormal` (CVE-2021-29568) | Advisory | 2021-05-14 |
| AVID-2026-R0774 | Heap out of bounds read in `RequantizationRange` (CVE-2021-29569) | Advisory | 2021-05-14 |
| AVID-2026-R0775 | Heap out of bounds read in `MaxPoolGradWithArgmax` (CVE-2021-29570) | Advisory | 2021-05-14 |
| AVID-2026-R0776 | Memory corruption in `DrawBoundingBoxesV2` (CVE-2021-29571) | Advisory | 2021-05-14 |
| AVID-2026-R0777 | Reference binding to nullptr in `SdcaOptimizer` (CVE-2021-29572) | Advisory | 2021-05-14 |
| AVID-2026-R0778 | Undefined behavior in `MaxPool3DGradGrad` (CVE-2021-29574) | Advisory | 2021-05-14 |
| AVID-2026-R0779 | Overflow/denial of service in `tf.raw_ops.ReverseSequence` (CVE-2021-29575) | Advisory | 2021-05-14 |
| AVID-2026-R0780 | Heap buffer overflow in `MaxPool3DGradGrad` (CVE-2021-29576) | Advisory | 2021-05-14 |
| AVID-2026-R0781 | Heap buffer overflow in `AvgPool3DGrad` (CVE-2021-29577) | Advisory | 2021-05-14 |
| AVID-2026-R0782 | Heap buffer overflow in `FractionalAvgPoolGrad` (CVE-2021-29578) | Advisory | 2021-05-14 |
| AVID-2026-R0783 | Heap buffer overflow in `MaxPoolGrad` (CVE-2021-29579) | Advisory | 2021-05-14 |
| AVID-2026-R0784 | Undefined behavior and `CHECK`-fail in `FractionalMaxPoolGrad` (CVE-2021-29580) | Advisory | 2021-05-14 |
| AVID-2026-R0785 | Segfault in `CTCBeamSearchDecoder` (CVE-2021-29581) | Advisory | 2021-05-14 |
| AVID-2026-R0786 | Heap OOB read in `tf.raw_ops.Dequantize` (CVE-2021-29582) | Advisory | 2021-05-14 |
| AVID-2026-R0787 | Heap buffer overflow and undefined behavior in `FusedBatchNorm` (CVE-2021-29583) | Advisory | 2021-05-14 |
| AVID-2026-R0788 | CHECK-fail due to integer overflow (CVE-2021-29584) | Advisory | 2021-05-14 |
| AVID-2026-R0789 | Division by zero in padding computation in TFLite (CVE-2021-29585) | Advisory | 2021-05-14 |
| AVID-2026-R0790 | Division by zero in TFLite's implementation of `TransposeConv` (CVE-2021-29588) | Advisory | 2021-05-14 |
| AVID-2026-R0791 | Heap OOB read in TFLite's implementation of `Minimum` or `Maximum` (CVE-2021-29590) | Advisory | 2021-05-14 |
| AVID-2026-R0792 | Null pointer dereference in TFLite's `Reshape` operator (CVE-2021-29592) | Advisory | 2021-05-14 |
| AVID-2026-R0793 | Division by zero in TFLite's convolution code (CVE-2021-29594) | Advisory | 2021-05-14 |
| AVID-2026-R0794 | Division by zero in TFLite's implementation of `DepthToSpace` (CVE-2021-29595) | Advisory | 2021-05-14 |
| AVID-2026-R0795 | Division by zero in TFLite's implementation of `EmbeddingLookup` (CVE-2021-29596) | Advisory | 2021-05-14 |
| AVID-2026-R0796 | Heap OOB write in TFLite (CVE-2021-29603) | Advisory | 2021-05-14 |
| AVID-2026-R0797 | Division by zero in TFLite's implementation of hashtable lookup (CVE-2021-29604) | Advisory | 2021-05-14 |
| AVID-2026-R0798 | Integer overflow in TFLite memory allocation (CVE-2021-29605) | Advisory | 2021-05-14 |
| AVID-2026-R0799 | Heap OOB read in TFLite (CVE-2021-29606) | Advisory | 2021-05-14 |
| AVID-2026-R0800 | Heap OOB and null pointer dereference in `RaggedTensorToTensor` (CVE-2021-29608) | Advisory | 2021-05-14 |
| AVID-2026-R0801 | Incomplete validation in `SparseAdd` (CVE-2021-29609) | Advisory | 2021-05-14 |
| AVID-2026-R0802 | Incomplete validation in `SparseReshape` (CVE-2021-29611) | Advisory | 2021-05-14 |
| AVID-2026-R0803 | Heap buffer overflow in `BandedTriangularSolve` (CVE-2021-29612) | Advisory | 2021-05-14 |
| AVID-2026-R0804 | Incomplete validation in `tf.raw_ops.CTCLoss` (CVE-2021-29613) | Advisory | 2021-05-14 |
| AVID-2026-R0805 | Interpreter crash from `tf.io.decode_raw` (CVE-2021-29614) | Advisory | 2021-05-14 |
| AVID-2026-R0806 | Stack overflow in `ParseAttrValue` with nested tensors (CVE-2021-29615) | Advisory | 2021-05-14 |
| AVID-2026-R0807 | Null dereference in Grappler's `TrySimplify` (CVE-2021-29616) | Advisory | 2021-05-14 |
| AVID-2026-R0808 | Crash in `tf.strings.substr` due to `CHECK`-fail (CVE-2021-29617) | Advisory | 2021-05-14 |
| AVID-2026-R0809 | Crash in `tf.transpose` with complex inputs (CVE-2021-29618) | Advisory | 2021-05-14 |
| AVID-2026-R0810 | Segfault in `tf.raw_ops.SparseCountSparseOutput` (CVE-2021-29619) | Advisory | 2021-05-14 |
| AVID-2026-R0811 | Vulnerability CVE-2021-29730 | Advisory | 2021-07-09 |
| AVID-2026-R0812 | Vulnerability CVE-2021-31681 | Advisory | 2023-07-31 |
| AVID-2026-R0813 | Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint (CVE-2021-32635) | Advisory | 2021-05-28 |
| AVID-2026-R0814 | JupyterLab: XSS due to lack of sanitization of the action attribute of an html | Advisory | 2021-08-09 |
| AVID-2026-R0815 | Regular Expression Denial of Service in flask-restx (CVE-2021-32838) | Advisory | 2021-09-20 |
| AVID-2026-R0816 | Vulnerability CVE-2021-33073 | Advisory | 2021-11-17 |
| AVID-2026-R0817 | Vulnerability CVE-2021-33430 | Advisory | 2021-12-17 |
| AVID-2026-R0818 | Vulnerability CVE-2021-33648 | Advisory | 2022-06-27 |
| AVID-2026-R0819 | Vulnerability CVE-2021-33650 | Advisory | 2022-06-27 |
| AVID-2026-R0820 | Vulnerability CVE-2021-33651 | Advisory | 2022-06-27 |
| AVID-2026-R0821 | Mysql JDBC Connector Deserialize RCE (CVE-2021-36774) | Advisory | 2022-01-06 |
| AVID-2026-R0822 | Deleting PRTBs associated to a group doesn't cause deletion of corresponding RoleBindings (CVE-2021-36775) | Advisory | 2022-04-01 |
| AVID-2026-R0823 | Exposure of repository credentials to external third-party sources (CVE-2021-36778) | Advisory | 2022-05-02 |
| AVID-2026-R0824 | Vulnerability CVE-2021-3702 | Advisory | 2022-08-23 |
| AVID-2026-R0825 | Heap out of bounds access in sparse reduction operations in TensorFlow (CVE-2021-37635) | Advisory | 2021-08-12 |
| AVID-2026-R0826 | Floating point exception in `SparseDenseCwiseDiv` in TensorFlow (CVE-2021-37636) | Advisory | 2021-08-12 |
| AVID-2026-R0827 | Null pointer dereference in `CompressElement` in TensorFlow (CVE-2021-37637) | Advisory | 2021-08-12 |
| AVID-2026-R0828 | Null pointer dereference in `RaggedTensorToTensor` in TensorFlow (CVE-2021-37638) | Advisory | 2021-08-12 |
| AVID-2026-R0829 | Null pointer dereference and heap OOB read in TensorFlow (CVE-2021-37639) | Advisory | 2021-08-12 |
| AVID-2026-R0830 | Integer division by 0 in sparse reshaping in TensorFlow (CVE-2021-37640) | Advisory | 2021-08-12 |
| AVID-2026-R0831 | Heap OOB in `RaggedGather` in TensorFlow (CVE-2021-37641) | Advisory | 2021-08-12 |
| AVID-2026-R0832 | Division by 0 in `ResourceScatterDiv` in TensorFlow (CVE-2021-37642) | Advisory | 2021-08-12 |
| AVID-2026-R0833 | Null pointer dereference in `MatrixDiagPartOp` in TensorFlow (CVE-2021-37643) | Advisory | 2021-08-12 |
| AVID-2026-R0834 | `std::abort` raised from `TensorListReserve` in TensorFlow (CVE-2021-37644) | Advisory | 2021-08-12 |
| AVID-2026-R0835 | Integer overflow due to conversion to unsigned in TensorFlow (CVE-2021-37645) | Advisory | 2021-08-12 |
| AVID-2026-R0836 | Bad alloc in `StringNGrams` caused by integer conversion in TensorFlow (CVE-2021-37646) | Advisory | 2021-08-12 |
| AVID-2026-R0837 | Null pointer dereference in `SparseTensorSliceDataset` in TensorFlow (CVE-2021-37647) | Advisory | 2021-08-12 |
| AVID-2026-R0838 | Incorrect validation of `SaveV2` inputs in TensorFlow (CVE-2021-37648) | Advisory | 2021-08-12 |
| AVID-2026-R0839 | Null pointer dereference in `UncompressElement` in TensorFlow (CVE-2021-37649) | Advisory | 2021-08-12 |
| AVID-2026-R0840 | Segfault and heap buffer overflow in `{Experimental,}DatasetToTFRecord` in TensorFlow (CVE-2021-37650) | Advisory | 2021-08-12 |
| AVID-2026-R0841 | Heap buffer overflow in `FractionalAvgPoolGrad` in TensorFlow (CVE-2021-37651) | Advisory | 2021-08-12 |
| AVID-2026-R0842 | Use after free in boosted trees creation in TensorFlow (CVE-2021-37652) | Advisory | 2021-08-12 |
| AVID-2026-R0843 | Division by 0 in `ResourceGather` in TensorFlow (CVE-2021-37653) | Advisory | 2021-08-12 |
| AVID-2026-R0844 | Heap OOB and CHECK fail in `ResourceGather` in TensorFlow (CVE-2021-37654) | Advisory | 2021-08-12 |
| AVID-2026-R0845 | Heap OOB in `ResourceScatterUpdate` in TensorFlow (CVE-2021-37655) | Advisory | 2021-08-12 |
| AVID-2026-R0846 | Reference binding to nullptr in `RaggedTensorToSparse` in TensorFlow (CVE-2021-37656) | Advisory | 2021-08-12 |
| AVID-2026-R0847 | Reference binding to nullptr in `MatrixDiagV*` ops in TensorFlow (CVE-2021-37657) | Advisory | 2021-08-12 |
| AVID-2026-R0848 | Reference binding to nullptr in `MatrixSetDiagV*` ops in TensorFlow (CVE-2021-37658) | Advisory | 2021-08-12 |
| AVID-2026-R0849 | Out of bounds read via null pointer dereference in TensorFlow (CVE-2021-37659) | Advisory | 2021-08-12 |
| AVID-2026-R0850 | Division by 0 in inplace operations in TensorFlow (CVE-2021-37660) | Advisory | 2021-08-12 |
| AVID-2026-R0851 | Crash caused by integer conversion to unsigned in TensorFlow (CVE-2021-37661) | Advisory | 2021-08-12 |
| AVID-2026-R0852 | Reference binding to nullptr in boosted trees in TensorFlow (CVE-2021-37662) | Advisory | 2021-08-12 |
| AVID-2026-R0853 | Incomplete validation in `QuantizeV2` in TensorFlow (CVE-2021-37663) | Advisory | 2021-08-12 |
| AVID-2026-R0854 | Heap OOB in boosted trees in TensorFlow (CVE-2021-37664) | Advisory | 2021-08-12 |
| AVID-2026-R0855 | Incomplete validation in MKL requantization in TensorFlow (CVE-2021-37665) | Advisory | 2021-08-12 |
| AVID-2026-R0856 | Reference binding to nullptr in `RaggedTensorToVariant` in TensorFlow (CVE-2021-37666) | Advisory | 2021-08-12 |
| AVID-2026-R0857 | Reference binding to nullptr in unicode encoding in TensorFlow (CVE-2021-37667) | Advisory | 2021-08-12 |
| AVID-2026-R0858 | Division by zero in TensorFlow Lite `tf.raw_ops.UnravelIndex` (CVE-2021-37668) | Advisory | 2021-08-12 |
| AVID-2026-R0859 | Crash in NMS ops caused by integer conversion to unsigned in TensorFlow (CVE-2021-37669) | Advisory | 2021-08-12 |
| AVID-2026-R0860 | Heap OOB in `UpperBound` and `LowerBound` in TensorFlow (CVE-2021-37670) | Advisory | 2021-08-12 |
| AVID-2026-R0861 | Reference binding to nullptr in map operations in TensorFlow (CVE-2021-37671) | Advisory | 2021-08-12 |
| AVID-2026-R0862 | Heap OOB in `SdcaOptimizerV2` in TensorFlow (CVE-2021-37672) | Advisory | 2021-08-12 |
| AVID-2026-R0863 | `CHECK`-fail in `MapStage` in TensorFlow (CVE-2021-37673) | Advisory | 2021-08-12 |
| AVID-2026-R0864 | Incomplete validation in `MaxPoolGrad` in TensorFlow (CVE-2021-37674) | Advisory | 2021-08-12 |
| AVID-2026-R0865 | Division by 0 in most convolution operators in TensorFlow (CVE-2021-37675) | Advisory | 2021-08-12 |
| AVID-2026-R0866 | Reference binding to nullptr in shape inference in TensorFlow (CVE-2021-37676) | Advisory | 2021-08-12 |
| AVID-2026-R0867 | Missing validation in shape inference for `Dequantize` in TensorFlow (CVE-2021-37677) | Advisory | 2021-08-12 |
| AVID-2026-R0868 | Heap OOB in nested `tf.map_fn` with `RaggedTensor`s in TensorFlow (CVE-2021-37679) | Advisory | 2021-08-12 |
| AVID-2026-R0869 | Division by zero in TFLite in TensorFlow (CVE-2021-37680) | Advisory | 2021-08-12 |
| AVID-2026-R0870 | Null pointer exception in TensorFlow Lite (CVE-2021-37681) | Advisory | 2021-08-12 |
| AVID-2026-R0871 | Division by zero in TensorFlow Lite division operations (CVE-2021-37683) | Advisory | 2021-08-12 |
| AVID-2026-R0872 | Division by zero in TensorFlow Lite pooling operations (CVE-2021-37684) | Advisory | 2021-08-12 |
| AVID-2026-R0873 | Heap OOB in TensorFlow Lite (CVE-2021-37685) | Advisory | 2021-08-12 |
| AVID-2026-R0874 | Infinite loop in TensorFlow Lite (CVE-2021-37686) | Advisory | 2021-08-12 |
| AVID-2026-R0875 | Heap OOB in TensorFlow Lite's `Gather*` implementations (CVE-2021-37687) | Advisory | 2021-08-12 |
| AVID-2026-R0876 | Null pointer dereference in TensorFlow Lite (CVE-2021-37688) | Advisory | 2021-08-12 |
| AVID-2026-R0877 | Use after free and segfault in shape inference functions in TensorFlow (CVE-2021-37690) | Advisory | 2021-08-12 |
| AVID-2026-R0878 | Segfault on strings tensors with mistmatched dimensions in TensorFlow (CVE-2021-37692) | Advisory | 2021-08-12 |
| AVID-2026-R0879 | Shell Command Injection Vulnerability in Nimbus Thrift Server (CVE-2021-38294) | Advisory | 2021-10-25 |
| AVID-2026-R0880 | Apache Spark Key Negotiation Vulnerability (CVE-2021-38296) | Advisory | 2022-03-10 |
| AVID-2026-R0881 | Improper Restriction of XML External Entity Reference in stanfordnlp/corenlp (CVE-2021-3869) | Advisory | 2021-10-19 |
| AVID-2026-R0882 | Improper Restriction of XML External Entity Reference in stanfordnlp/corenlp (CVE-2021-3878) | Advisory | 2021-10-15 |
| AVID-2026-R0883 | Dependency injection in NVCaffe (CVE-2021-39158) | Advisory | 2021-08-23 |
| AVID-2026-R0884 | Code injection in nbgitpuller (CVE-2021-39160) | Advisory | 2021-08-25 |
| AVID-2026-R0885 | Vulnerability CVE-2021-39906 | Advisory | 2021-11-04 |
| AVID-2026-R0886 | Improperly Implemented path matching for in-toto-golang (CVE-2021-41087) | Advisory | 2021-09-21 |
| AVID-2026-R0887 | Splash authentication credentials potentially leaked to target websites in scrapy-splash (CVE-2021-41124) | Advisory | 2021-10-05 |
| AVID-2026-R0888 | Crash in `tf.math.segment_*` operations (CVE-2021-41195) | Advisory | 2021-11-05 |
| AVID-2026-R0889 | Crash in `max_pool3d` when size argument is 0 or negative (CVE-2021-41196) | Advisory | 2021-11-05 |
| AVID-2026-R0890 | Crashes due to overflow and `CHECK`-fail in ops with large tensor shapes (CVE-2021-41197) | Advisory | 2021-11-05 |
| AVID-2026-R0891 | Overflow/crash in `tf.tile` when tiling tensor is large (CVE-2021-41198) | Advisory | 2021-11-05 |
| AVID-2026-R0892 | Overflow/crash in `tf.image.resize` when size is large (CVE-2021-41199) | Advisory | 2021-11-05 |
| AVID-2026-R0893 | Incomplete validation in `tf.summary.create_file_writer` (CVE-2021-41200) | Advisory | 2021-11-05 |
| AVID-2026-R0894 | Unitialized access in `EinsumHelper::ParseEquation` (CVE-2021-41201) | Advisory | 2021-11-05 |
| AVID-2026-R0895 | Overflow/crash in `tf.range` (CVE-2021-41202) | Advisory | 2021-11-05 |
| AVID-2026-R0896 | Missing validation during checkpoint loading (CVE-2021-41203) | Advisory | 2021-11-05 |
| AVID-2026-R0897 | Segfault while copying constant resource tensor (CVE-2021-41204) | Advisory | 2021-11-05 |
| AVID-2026-R0898 | Heap OOB read in all `tf.raw_ops.QuantizeAndDequantizeV*` ops (CVE-2021-41205) | Advisory | 2021-11-05 |
| AVID-2026-R0899 | Incomplete validation of shapes in multiple TF ops (CVE-2021-41206) | Advisory | 2021-11-05 |
| AVID-2026-R0900 | Division by zero in `ParallelConcat` (CVE-2021-41207) | Advisory | 2021-11-05 |
| AVID-2026-R0901 | FPE in convolutions with zero size filters (CVE-2021-41209) | Advisory | 2021-11-05 |
| AVID-2026-R0902 | Heap OOB read in `tf.raw_ops.SparseCountSparseOutput` (CVE-2021-41210) | Advisory | 2021-11-05 |
| AVID-2026-R0903 | Heap OOB read in shape inference for `QuantizeV2` (CVE-2021-41211) | Advisory | 2021-11-05 |
| AVID-2026-R0904 | Heap OOB read in `tf.ragged.cross` (CVE-2021-41212) | Advisory | 2021-11-05 |
| AVID-2026-R0905 | Reference binding to `nullptr` in `tf.ragged.cross` (CVE-2021-41214) | Advisory | 2021-11-05 |
| AVID-2026-R0906 | Null pointer exception in `DeserializeSparse` (CVE-2021-41215) | Advisory | 2021-11-05 |
| AVID-2026-R0907 | Heap buffer overflow in `Transpose` (CVE-2021-41216) | Advisory | 2021-11-05 |
| AVID-2026-R0908 | Null pointer exception when `Exit` node is not preceded by `Enter` op (CVE-2021-41217) | Advisory | 2021-11-05 |
| AVID-2026-R0909 | Integer division by 0 in `tf.raw_ops.AllToAll` (CVE-2021-41218) | Advisory | 2021-11-05 |
| AVID-2026-R0910 | Undefined behavior via `nullptr` reference binding in sparse matrix multiplication (CVE-2021-41219) | Advisory | 2021-11-05 |
| AVID-2026-R0911 | Use after free in `CollectiveReduceV2` (CVE-2021-41220) | Advisory | 2021-11-05 |
| AVID-2026-R0912 | Access to invalid memory during shape inference in `Cudnn*` ops (CVE-2021-41221) | Advisory | 2021-11-05 |
| AVID-2026-R0913 | Segfault due to negative splits in `SplitV` (CVE-2021-41222) | Advisory | 2021-11-05 |
| AVID-2026-R0914 | Heap OOB read in `FusedBatchNorm` kernels (CVE-2021-41223) | Advisory | 2021-11-05 |
| AVID-2026-R0915 | `SparseFillEmptyRows` heap OOB read (CVE-2021-41224) | Advisory | 2021-11-05 |
| AVID-2026-R0916 | Heap OOB read in `SparseBinCount` (CVE-2021-41226) | Advisory | 2021-11-05 |
| AVID-2026-R0917 | Code injection in `saved_model_cli` (CVE-2021-41228) | Advisory | 2021-11-05 |
| AVID-2026-R0918 | Vulnerability CVE-2021-41495 | Advisory | 2021-12-17 |
| AVID-2026-R0919 | Apache Parquet-MR potential DoS in case of malicious Parquet file (CVE-2021-41561) | Advisory | 2021-12-20 |
| AVID-2026-R0920 | Vulnerability CVE-2021-42343 | Advisory | 2021-10-26 |
| AVID-2026-R0921 | Vulnerability CVE-2021-42951 | Advisory | 2022-03-01 |
| AVID-2026-R0922 | Vulnerability CVE-2021-42969 | Advisory | 2022-05-13 |
| AVID-2026-R0923 | Bot Framework SDK Remote Code Execution Vulnerability (CVE-2021-43225) | Advisory | 2021-12-15 |
| AVID-2026-R0924 | Inefficient Regular Expression Complexity in nltk (CVE-2021-43854) | Advisory | 2021-12-23 |
| AVID-2026-R0925 | Chain Sea Information Integration Co., Ltd ai chatbot system - Reflected XSS (CVE-2021-44163) | Advisory | 2021-12-20 |
| AVID-2026-R0926 | Chain Sea Information Integration Co., Ltd ai chatbot system - Arbitrary File Upload (CVE-2021-44164) | Advisory | 2021-12-20 |
| AVID-2026-R0927 | Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints (CVE-2021-44228) | Advisory | 2021-12-10 |
| AVID-2026-R0928 | Apache Log4j2 vulnerable to RCE via JDBC Appender when attacker controls configuration (CVE-2021-44832) | Advisory | 2021-12-28 |
| AVID-2026-R0929 | Vulnerability CVE-2021-45074 | Advisory | 2022-03-02 |
| AVID-2026-R0930 | Apache Airflow: Reflected XSS via Origin Query Argument in URL (CVE-2021-45229) | Advisory | 2022-02-25 |
| AVID-2026-R0931 | Log4j hot patch package privilege escalation (CVE-2022-0070) | Advisory | 2022-04-19 |
| AVID-2026-R0932 | Improper Restriction of XML External Entity Reference in stanfordnlp/corenlp (CVE-2022-0198) | Advisory | 2022-01-13 |
| AVID-2026-R0933 | Vulnerability CVE-2022-0573 | Advisory | 2022-05-16 |
| AVID-2026-R0934 | Vulnerability CVE-2022-0668 | Advisory | 2023-01-08 |
| AVID-2026-R0935 | Code Injection in pytorchlightning/pytorch-lightning (CVE-2022-0845) | Advisory | 2022-03-05 |
| AVID-2026-R0936 | Vulnerability CVE-2022-1423 | Advisory | 2022-05-19 |
| AVID-2026-R0937 | Out of Memory issue in ProtocolBuffers for cpp and python (CVE-2022-1941) | Advisory | 2022-09-22 |
| AVID-2026-R0938 | Vulnerability CVE-2022-20617 | Advisory | 2022-01-12 |
| AVID-2026-R0939 | Pipenv's requirements.txt parsing allows malicious index url in comments (CVE-2022-21668) | Advisory | 2022-01-10 |
| AVID-2026-R0940 | SSRF vulnerability (requires authentication) (CVE-2022-21697) | Advisory | 2022-01-25 |
| AVID-2026-R0941 | Division by zero in Tensorflow (CVE-2022-21725) | Advisory | 2022-02-03 |
| AVID-2026-R0942 | Out of bounds read in Tensorflow (CVE-2022-21726) | Advisory | 2022-02-03 |
| AVID-2026-R0943 | Integer overflow in Tensorflow (CVE-2022-21727) | Advisory | 2022-02-03 |
| AVID-2026-R0944 | Out of bounds read in Tensorflow (CVE-2022-21728) | Advisory | 2022-02-03 |
| AVID-2026-R0945 | Overflow and uncaught divide by zero in Tensorflow (CVE-2022-21729) | Advisory | 2022-02-03 |
| AVID-2026-R0946 | Out of bounds read in Tensorflow (CVE-2022-21730) | Advisory | 2022-02-03 |
| AVID-2026-R0947 | Type confusion leading to segfault in Tensorflow (CVE-2022-21731) | Advisory | 2022-02-03 |
| AVID-2026-R0948 | Memory exhaustion in Tensorflow (CVE-2022-21732) | Advisory | 2022-02-03 |
| AVID-2026-R0949 | Memory exhaustion in Tensorflow (CVE-2022-21733) | Advisory | 2022-02-03 |
| AVID-2026-R0950 | `CHECK`-failures in Tensorflow (CVE-2022-21734) | Advisory | 2022-02-03 |
| AVID-2026-R0951 | Undefined behavior in Tensorflow (CVE-2022-21736) | Advisory | 2022-02-03 |
| AVID-2026-R0952 | Integer overflow leading to crash in Tensorflow (CVE-2022-21738) | Advisory | 2022-02-03 |
| AVID-2026-R0953 | Null pointer dereference in TensorFlow (CVE-2022-21739) | Advisory | 2022-02-03 |
| AVID-2026-R0954 | Heap overflow in Tensorflow (CVE-2022-21740) | Advisory | 2022-02-03 |
| AVID-2026-R0955 | Division by zero in TFLite (CVE-2022-21741) | Advisory | 2022-02-03 |
| AVID-2026-R0956 | Vulnerability CVE-2022-21820 | Advisory | 2022-03-24 |
| AVID-2026-R0957 | Vulnerability CVE-2022-21821 | Advisory | 2022-03-29 |
| AVID-2026-R0958 | Vulnerability CVE-2022-21822 | Advisory | 2022-03-17 |
| AVID-2026-R0959 | Vulnerability CVE-2022-2185 | Advisory | 2022-07-01 |
| AVID-2026-R0960 | Vulnerability CVE-2022-22965 | Advisory | 2022-04-01 |
| AVID-2026-R0961 | Command Injection (CVE-2022-22984) | Advisory | 2022-11-30 |
| AVID-2026-R0962 | Arbitrary File Write when Extracting Tarballs retrieved from a remote location using in mindsdb (CVE-2022-23522) | Advisory | 2023-03-30 |
| AVID-2026-R0963 | jsonwebtoken unrestricted key type could lead to legacy keys usage (CVE-2022-23539) | Advisory | 2022-12-22 |
| AVID-2026-R0964 | Integer overflow in TFLite (CVE-2022-23559) | Advisory | 2022-02-04 |
| AVID-2026-R0965 | Read and Write outside of bounds in TFLite (CVE-2022-23560) | Advisory | 2022-02-04 |
| AVID-2026-R0966 | Integer overflow in Tensorflow (CVE-2022-23562) | Advisory | 2022-02-04 |
| AVID-2026-R0967 | Insecure temporary file in Tensorflow (CVE-2022-23563) | Advisory | 2022-02-04 |
| AVID-2026-R0968 | Reachable Assertion in Tensorflow (CVE-2022-23564) | Advisory | 2022-02-04 |
| AVID-2026-R0969 | Out of bounds write in Tensorflow (CVE-2022-23566) | Advisory | 2022-02-04 |
| AVID-2026-R0970 | Integer overflows in Tensorflow (CVE-2022-23567) | Advisory | 2022-02-03 |
| AVID-2026-R0971 | Integer overflows in Tensorflow (CVE-2022-23568) | Advisory | 2022-02-03 |
| AVID-2026-R0972 | Null-dereference in Tensorflow (CVE-2022-23570) | Advisory | 2022-02-04 |
| AVID-2026-R0973 | Reachable Assertion in Tensorflow (CVE-2022-23571) | Advisory | 2022-02-04 |
| AVID-2026-R0974 | Crash when type cannot be specialized in Tensorflow (CVE-2022-23572) | Advisory | 2022-02-04 |
| AVID-2026-R0975 | Uninitialized variable access in Tensorflow (CVE-2022-23573) | Advisory | 2022-02-04 |
| AVID-2026-R0976 | Out of bounds read and write in Tensorflow (CVE-2022-23574) | Advisory | 2022-02-04 |
| AVID-2026-R0977 | Integer overflow in Tensorflow (CVE-2022-23575) | Advisory | 2022-02-04 |
| AVID-2026-R0978 | Integer overflow in Tensorflow (CVE-2022-23576) | Advisory | 2022-02-04 |
| AVID-2026-R0979 | Null-dereference in Tensorflow (CVE-2022-23577) | Advisory | 2022-02-04 |
| AVID-2026-R0980 | Memory leak in Tensorflow (CVE-2022-23578) | Advisory | 2022-02-04 |
| AVID-2026-R0981 | `CHECK`-failures during Grappler's `SafeToRemoveIdentity` in Tensorflow (CVE-2022-23579) | Advisory | 2022-02-04 |
| AVID-2026-R0982 | Abort caused by allocating a vector that is too large in Tensorflow (CVE-2022-23580) | Advisory | 2022-02-04 |
| AVID-2026-R0983 | `CHECK`-failures during Grappler's `IsSimplifiableReshape` in Tensorflow (CVE-2022-23581) | Advisory | 2022-02-04 |
| AVID-2026-R0984 | `CHECK`-failures in `TensorByteSize` in Tensorflow (CVE-2022-23582) | Advisory | 2022-02-04 |
| AVID-2026-R0985 | `CHECK`-failures in binary ops in Tensorflow (CVE-2022-23583) | Advisory | 2022-02-04 |
| AVID-2026-R0986 | Use after free in `DecodePng` in Tensorflow (CVE-2022-23584) | Advisory | 2022-02-04 |
| AVID-2026-R0987 | Memory leak in decoding PNG images in Tensorflow (CVE-2022-23585) | Advisory | 2022-02-04 |
| AVID-2026-R0988 | Multiple `CHECK`-fails in `function.cc` in Tensorflow (CVE-2022-23586) | Advisory | 2022-02-04 |
| AVID-2026-R0989 | Integer overflow in Tensorflow (CVE-2022-23587) | Advisory | 2022-02-04 |
| AVID-2026-R0990 | Null pointer dereference in Grappler's `IsConstant` in Tensorflow (CVE-2022-23589) | Advisory | 2022-02-04 |
| AVID-2026-R0991 | Stack overflow in Tensorflow (CVE-2022-23591) | Advisory | 2022-02-04 |
| AVID-2026-R0992 | Out of bounds read in Tensorflow (CVE-2022-23592) | Advisory | 2022-02-04 |
| AVID-2026-R0993 | Segfault in `simplifyBroadcast` in Tensorflow (CVE-2022-23593) | Advisory | 2022-02-04 |
| AVID-2026-R0994 | Out of bounds read in Tensorflow (CVE-2022-23594) | Advisory | 2022-02-04 |
| AVID-2026-R0995 | Null pointer dereference in TensorFlow (CVE-2022-23595) | Advisory | 2022-02-04 |
| AVID-2026-R0996 | Vulnerability CVE-2022-2417 | Advisory | 2022-08-05 |
| AVID-2026-R0997 | Apache Pulsar Proxy target broker address isn't validated (CVE-2022-24280) | Advisory | 2022-09-23 |
| AVID-2026-R0998 | ReDoS in Apache MXNet RTC Module (CVE-2022-24294) | Advisory | 2022-07-24 |
| AVID-2026-R0999 | Sensitive Auth & Cookie data stored in Jupyter server logs (CVE-2022-24757) | Advisory | 2022-03-23 |
| AVID-2026-R1000 | Insertion of Sensitive Information into Log File affects Jupyter Notebook (CVE-2022-24758) | Advisory | 2022-03-31 |
| AVID-2026-R1001 | Improper Neutralization of Formula Elements in a CSV File in Gradio Flagging (CVE-2022-24770) | Advisory | 2022-03-17 |
| AVID-2026-R1002 | Vulnerability CVE-2022-25201 | Advisory | 2022-02-15 |
| AVID-2026-R1003 | Deserialization of Untrusted Data (CVE-2022-25845) | Advisory | 2022-06-10 |
| AVID-2026-R1004 | Vulnerability CVE-2022-25864 | Advisory | 2023-08-11 |
| AVID-2026-R1005 | Vulnerability CVE-2022-26076 | Advisory | 2023-02-16 |
| AVID-2026-R1006 | Vulnerability CVE-2022-26425 | Advisory | 2023-02-16 |
| AVID-2026-R1007 | Vulnerability CVE-2022-26526 | Advisory | 2022-03-17 |
| AVID-2026-R1008 | Vulnerability CVE-2022-27199 | Advisory | 2022-03-15 |
| AVID-2026-R1009 | Vulnerability CVE-2022-27234 | Advisory | 2023-02-16 |
| AVID-2026-R1010 | Vulnerability CVE-2022-28199 | Advisory | 2022-09-01 |
| AVID-2026-R1011 | Vulnerability CVE-2022-28696 | Advisory | 2022-08-18 |
| AVID-2026-R1012 | Vulnerability CVE-2022-2884 | Advisory | 2022-10-17 |
| AVID-2026-R1013 | No protection against rollback attacks in go-tuf (CVE-2022-29173) | Advisory | 2022-05-05 |
| AVID-2026-R1014 | Missing validation causes denial of service via `GetSessionTensor` in TensorFlow (CVE-2022-29191) | Advisory | 2022-05-20 |
| AVID-2026-R1015 | Missing validation crashes `QuantizeAndDequantizeV4Grad` in TensorFlow (CVE-2022-29192) | Advisory | 2022-05-20 |
| AVID-2026-R1016 | Missing validation causes `TensorSummaryV2` in TensorFlow to crash (CVE-2022-29193) | Advisory | 2022-05-20 |
| AVID-2026-R1017 | Missing validation causes denial of service via `DeleteSessionTensor` in TensorFlow (CVE-2022-29194) | Advisory | 2022-05-20 |
| AVID-2026-R1018 | Missing validation causes denial of service in TensorFlow via `StagePeek` (CVE-2022-29195) | Advisory | 2022-05-20 |
| AVID-2026-R1019 | Missing validation causes denial of service in TensorFlow via `Conv3DBackpropFilterV2` (CVE-2022-29196) | Advisory | 2022-05-20 |
| AVID-2026-R1020 | Missing validation causes denial of service in TensorFlow via `UnsortedSegmentJoin` (CVE-2022-29197) | Advisory | 2022-05-20 |
| AVID-2026-R1021 | Missing validation causes denial of service in TensorFlow via `SparseTensorToCSRSparseMatrix` (CVE-2022-29198) | Advisory | 2022-05-20 |
| AVID-2026-R1022 | Missing validation causes denial of service in TensorFlow via `LoadAndRemapMatrix` (CVE-2022-29199) | Advisory | 2022-05-20 |
| AVID-2026-R1023 | Missing validation causes denial of service in TensorFlow via `LSTMBlockCell` (CVE-2022-29200) | Advisory | 2022-05-20 |
| AVID-2026-R1024 | Missing validation in `QuantizedConv2D` results in undefined behavior in TensorFlow (CVE-2022-29201) | Advisory | 2022-05-20 |
| AVID-2026-R1025 | Denial of service in TensorFlow due to lack of validation in `tf.ragged.constant` (CVE-2022-29202) | Advisory | 2022-05-20 |
| AVID-2026-R1026 | Integer overflow in `SpaceToBatchND` in TensorFlow (CVE-2022-29203) | Advisory | 2022-05-20 |
| AVID-2026-R1027 | Missing validation causes denial of service in TensorFlow via `Conv3DBackpropFilterV2` (CVE-2022-29204) | Advisory | 2022-05-20 |
| AVID-2026-R1028 | Segfault due to missing support for quantized types in TensorFlow (CVE-2022-29205) | Advisory | 2022-05-20 |
| AVID-2026-R1029 | Missing validation results in undefined behavior in `SparseTensorDenseAdd` in TensorFlow (CVE-2022-29206) | Advisory | 2022-05-20 |
| AVID-2026-R1030 | Undefined behavior when users supply invalid resource handles in TensorFlow (CVE-2022-29207) | Advisory | 2022-05-20 |
| AVID-2026-R1031 | Segfault and Out-of-bounds Write write due to incomplete validation in TensorFlow (CVE-2022-29208) | Advisory | 2022-05-20 |
| AVID-2026-R1032 | Type confusion leading to `CHECK`-failure based denial of service in TensorFlow (CVE-2022-29209) | Advisory | 2022-05-20 |
| AVID-2026-R1033 | Heap buffer overflow due to incorrect hash function in TensorFlow (CVE-2022-29210) | Advisory | 2022-05-20 |
| AVID-2026-R1034 | Segfault in TensorFlow if `tf.histogram_fixed_width` is called with NaN values (CVE-2022-29211) | Advisory | 2022-05-20 |
| AVID-2026-R1035 | Core dump when loading TFLite models with quantization in TensorFlow (CVE-2022-29212) | Advisory | 2022-05-20 |
| AVID-2026-R1036 | Incomplete validation in signal ops leads to crashes in TensorFlow (CVE-2022-29213) | Advisory | 2022-05-20 |
| AVID-2026-R1037 | Code injection in `saved_model_cli` in TensorFlow (CVE-2022-29216) | Advisory | 2022-05-20 |
| AVID-2026-R1038 | Key confusion through non-blocklisted public key formats in PyJWT (CVE-2022-29217) | Advisory | 2022-05-24 |
| AVID-2026-R1039 | Forced Browsing in Jupyter Notebook (CVE-2022-29238) | Advisory | 2022-06-14 |
| AVID-2026-R1040 | TIBCO Statistica Reflected Cross Site Scripting (XSS) Vulnerability (CVE-2022-30575) | Advisory | 2022-08-16 |
| AVID-2026-R1041 | Vulnerability CVE-2022-30882 | Advisory | 2022-06-08 |
| AVID-2026-R1042 | Server-Side Request Forgery Vulnerability in Computer Vision Annotation Tool (CVAT) (CVE-2022-31188) | Advisory | 2022-08-01 |
| AVID-2026-R1043 | Vulnerability CVE-2022-31523 | Advisory | 2022-07-11 |
| AVID-2026-R1044 | Vulnerability CVE-2022-31616 | Advisory | 2022-11-18 |
| AVID-2026-R1045 | Puppetlabs-mysql Command Injection (CVE-2022-3276) | Advisory | 2022-10-07 |
| AVID-2026-R1046 | Vulnerability CVE-2022-32997 | Advisory | 2022-06-24 |
| AVID-2026-R1047 | Vulnerability CVE-2022-33002 | Advisory | 2022-06-24 |
| AVID-2026-R1048 | Improper authentication in Qualcomm IPC (CVE-2022-33242) | Advisory | 2023-03-07 |
| AVID-2026-R1049 | Apache Pulsar C++/Python OAuth Clients prior to 3.0.0 were vulnerable to an MITM attack due to Disabled Certificate Validation (CVE-2022-33684) | Advisory | 2022-11-04 |
| AVID-2026-R1050 | Apache Spark shell command injection vulnerability via Spark UI (CVE-2022-33891) | Advisory | 2022-07-18 |
| AVID-2026-R1051 | Vulnerability CVE-2022-34061 | Advisory | 2022-06-24 |
| AVID-2026-R1052 | Apache Pulsar: Improper Authentication for Pulsar Proxy Statistics Endpoint (CVE-2022-34321) | Advisory | 2024-03-12 |
| AVID-2026-R1053 | Vulnerability CVE-2022-34665 | Advisory | 2022-11-18 |
| AVID-2026-R1054 | Vulnerability CVE-2022-34667 | Advisory | 2022-11-18 |
| AVID-2026-R1055 | Vulnerability CVE-2022-34668 | Advisory | 2022-08-29 |
| AVID-2026-R1056 | Vulnerability CVE-2022-34676 | Advisory | 2022-12-30 |
| AVID-2026-R1057 | Vulnerability CVE-2022-34982 | Advisory | 2022-07-22 |
| AVID-2026-R1058 | Streamlit directory traversal vulnerability (CVE-2022-35918) | Advisory | 2022-08-01 |
| AVID-2026-R1059 | False positive signature verification in cosign (CVE-2022-35929) | Advisory | 2022-08-04 |
| AVID-2026-R1060 | `CHECK` failure in tf.reshape in Tensorflow (CVE-2022-35934) | Advisory | 2022-09-16 |
| AVID-2026-R1061 | `CHECK` failure in `SobolSample` via missing validation in TensorFlow (CVE-2022-35935) | Advisory | 2022-09-16 |
| AVID-2026-R1062 | OOB read in `Gather_nd` op in TensorFlow Lite (CVE-2022-35937) | Advisory | 2022-09-16 |
| AVID-2026-R1063 | OOB read in `Gather_nd` op in TensorFlow Lite Micro (CVE-2022-35938) | Advisory | 2022-09-16 |
| AVID-2026-R1064 | Out of bounds write in `scatter_nd` op in TensorFlow Lite (CVE-2022-35939) | Advisory | 2022-09-16 |
| AVID-2026-R1065 | Int overflow in `RaggedRangeOp` in Tensoflow (CVE-2022-35940) | Advisory | 2022-09-16 |
| AVID-2026-R1066 | `CHECK` failure in `AvgPoolOp` in Tensorflow (CVE-2022-35941) | Advisory | 2022-09-16 |
| AVID-2026-R1067 | `CHECK` failures in `UnbatchGradOp` in TensorFlow (CVE-2022-35952) | Advisory | 2022-09-16 |
| AVID-2026-R1068 | `CHECK` failures in `AvgPool3DGrad` in TensorFlow (CVE-2022-35959) | Advisory | 2022-09-16 |
| AVID-2026-R1069 | `CHECK` failure in `TensorListReserve` in TensorFlow (CVE-2022-35960) | Advisory | 2022-09-16 |
| AVID-2026-R1070 | `CHECK` failures in `FractionalAvgPoolGrad` in TensorFlow (CVE-2022-35963) | Advisory | 2022-09-16 |
| AVID-2026-R1071 | Segfault in `BlockLSTMGradV2` in TensorFlow (CVE-2022-35964) | Advisory | 2022-09-16 |
| AVID-2026-R1072 | Segfault in `LowerBound` and `UpperBound` in TensorFlow (CVE-2022-35965) | Advisory | 2022-09-16 |
| AVID-2026-R1073 | Segfault in `QuantizedAvgPool` in TensorFlow (CVE-2022-35966) | Advisory | 2022-09-16 |
| AVID-2026-R1074 | Segfault in `QuantizedAdd` in TensorFlow (CVE-2022-35967) | Advisory | 2022-09-16 |
| AVID-2026-R1075 | `CHECK` fail in `AvgPoolGrad` in TensorFlow (CVE-2022-35968) | Advisory | 2022-09-16 |
| AVID-2026-R1076 | `CHECK` fail in `Conv2DBackpropInput` in TensorFlow (CVE-2022-35969) | Advisory | 2022-09-16 |
| AVID-2026-R1077 | Segfault in `QuantizedInstanceNorm` in TensorFlow (CVE-2022-35970) | Advisory | 2022-09-16 |
| AVID-2026-R1078 | `CHECK` fail in `FakeQuantWithMinMaxVars` in TensorFlow (CVE-2022-35971) | Advisory | 2022-09-16 |
| AVID-2026-R1079 | Segfault in `QuantizedBiasAdd` in TensorFlow (CVE-2022-35972) | Advisory | 2022-09-16 |
| AVID-2026-R1080 | Segfault in `QuantizedMatMul` in TensorFlow (CVE-2022-35973) | Advisory | 2022-09-16 |
| AVID-2026-R1081 | Segfault in `QuantizedRelu` and `QuantizedRelu6` (CVE-2022-35979) | Advisory | 2022-09-16 |
| AVID-2026-R1082 | `CHECK` fail in `FractionalMaxPoolGrad` in TensorFlow (CVE-2022-35981) | Advisory | 2022-09-16 |
| AVID-2026-R1083 | Segfault in `SparseBincount` in TensorFlow (CVE-2022-35982) | Advisory | 2022-09-16 |
| AVID-2026-R1084 | `CHECK` fail in `Save` and `SaveSlices` in TensorFlow (CVE-2022-35983) | Advisory | 2022-09-16 |
| AVID-2026-R1085 | `CHECK` fail in `ParameterizedTruncatedNormal` in TensorFlow (CVE-2022-35984) | Advisory | 2022-09-16 |
| AVID-2026-R1086 | `CHECK` fail in `LRNGrad` in TensorFlow (CVE-2022-35985) | Advisory | 2022-09-16 |
| AVID-2026-R1087 | Segfault in `RaggedBincount` in TensorFlow (CVE-2022-35986) | Advisory | 2022-09-16 |
| AVID-2026-R1088 | `CHECK` fail in `DenseBincount` in TensorFlow (CVE-2022-35987) | Advisory | 2022-09-16 |
| AVID-2026-R1089 | `CHECK` fail in `MaxPool` in TensorFlow (CVE-2022-35989) | Advisory | 2022-09-16 |
| AVID-2026-R1090 | `CHECK` fail in `FakeQuantWithMinMaxVarsPerChannelGradient` in TensorFlow (CVE-2022-35990) | Advisory | 2022-09-16 |
| AVID-2026-R1091 | `CHECK` fail in `TensorListScatter` and `TensorListScatterV2` in TensorFlow (CVE-2022-35991) | Advisory | 2022-09-16 |
| AVID-2026-R1092 | `CHECK` fail in `TensorListFromTensor` in TensorFlow (CVE-2022-35992) | Advisory | 2022-09-16 |
| AVID-2026-R1093 | `CHECK` fail in `CollectiveGather` in TensorFlow (CVE-2022-35994) | Advisory | 2022-09-16 |
| AVID-2026-R1094 | `CHECK` fail in `AudioSummaryV2` in TensorFlow (CVE-2022-35995) | Advisory | 2022-09-16 |
| AVID-2026-R1095 | Floating point exception in `Conv2D` in TensorFlow (CVE-2022-35996) | Advisory | 2022-09-16 |
| AVID-2026-R1096 | `CHECK` fail in `tf.sparse.cross` in TensorFlow (CVE-2022-35997) | Advisory | 2022-09-16 |
| AVID-2026-R1097 | `CHECK` fail in `EmptyTensorList` in TensorFlow (CVE-2022-35998) | Advisory | 2022-09-16 |
| AVID-2026-R1098 | `CHECK` fail in `Conv2DBackpropInput` in TensorFlow (CVE-2022-35999) | Advisory | 2022-09-16 |
| AVID-2026-R1099 | Null dereference on MLIR on empty function attributes in TensorFlow (CVE-2022-36000) | Advisory | 2022-09-16 |
| AVID-2026-R1100 | `CHECK` fail in `DrawBoundingBoxes` in TensorFlow (CVE-2022-36001) | Advisory | 2022-09-16 |
| AVID-2026-R1101 | `CHECK` fail in `Unbatch` in TensorFlow (CVE-2022-36002) | Advisory | 2022-09-16 |
| AVID-2026-R1102 | `CHECK` fail in `RandomPoissonV2` in TensorFlow (CVE-2022-36003) | Advisory | 2022-09-16 |
| AVID-2026-R1103 | `CHECK` fail in `tf.random.gamma` in TensorFlow (CVE-2022-36004) | Advisory | 2022-09-16 |
| AVID-2026-R1104 | `CHECK` fail in `FakeQuantWithMinMaxVarsGradient` in TensorFlow (CVE-2022-36005) | Advisory | 2022-09-16 |
| AVID-2026-R1105 | Null dereference on MLIR on empty function attributes in TensorFlow (CVE-2022-36011) | Advisory | 2022-09-16 |
| AVID-2026-R1106 | Assertion fail on MLIR empty edge names in TensorFlow (CVE-2022-36012) | Advisory | 2022-09-16 |
| AVID-2026-R1107 | Null-dereference in `mlir::tfg::GraphDefImporter::ConvertNodeDef` in TensorFlow (CVE-2022-36013) | Advisory | 2022-09-16 |
| AVID-2026-R1108 | Null-dereference in `mlir::tfg::TFOp::nameAttr` in TensorFlow (CVE-2022-36014) | Advisory | 2022-09-16 |
| AVID-2026-R1109 | Integer overflow in math ops in TensorFlow (CVE-2022-36015) | Advisory | 2022-09-16 |
| AVID-2026-R1110 | `CHECK`-fail in `tensorflow::full_type::SubstituteFromAttrs` in TensorFlow (CVE-2022-36016) | Advisory | 2022-09-16 |
| AVID-2026-R1111 | Segfault in `Requantize` in TensorFlow (CVE-2022-36017) | Advisory | 2022-09-16 |
| AVID-2026-R1112 | `CHECK` fail in `FakeQuantWithMinMaxVarsPerChannel` in TensorFlow (CVE-2022-36019) | Advisory | 2022-09-16 |
| AVID-2026-R1113 | Some Deeplearning4J packages use unclaimed s3 bucket in tests and examples (CVE-2022-36022) | Advisory | 2022-11-10 |
| AVID-2026-R1114 | Segfault TFLite converter on per-channel quantized transposed convolutions in TensorFlow (CVE-2022-36027) | Advisory | 2022-09-16 |
| AVID-2026-R1115 | Vulnerabilities with blob verification in sigstore cosign (CVE-2022-36056) | Advisory | 2022-09-14 |
| AVID-2026-R1116 | Extracting malicious crates can fill the file system (CVE-2022-36114) | Advisory | 2022-09-14 |
| AVID-2026-R1117 | Apache Calcite Avatica JDBC driver `httpclient_impl` connection property can be used as an RCE vector (CVE-2022-36364) | Advisory | 2022-07-28 |
| AVID-2026-R1118 | IBM Cloud Pak for Data file upload (CVE-2022-36769) | Advisory | 2023-04-26 |
| AVID-2026-R1119 | Docker Provider <3.0 RCE vulnerability in example dag (CVE-2022-38362) | Advisory | 2022-08-16 |
| AVID-2026-R1120 | Apache Airflow Pinot provider allowed Command Injection (CVE-2022-38649) | Advisory | 2022-11-22 |
| AVID-2026-R1121 | Vulnerability CVE-2022-38881 | Advisory | 2022-09-19 |
| AVID-2026-R1122 | Python-jwt subject to Authentication Bypass by Spoofing (CVE-2022-39227) | Advisory | 2022-09-23 |
| AVID-2026-R1123 | Execution with Unnecessary Privileges in JupyterApp (CVE-2022-39286) | Advisory | 2022-10-26 |
| AVID-2026-R1124 | Dependency-Track vulnerable to logging of API keys in clear text when handling API requests using keys with insufficient permissions (CVE-2022-39351) | Advisory | 2022-10-25 |
| AVID-2026-R1125 | Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration) (CVE-2022-39379) | Advisory | 2022-11-02 |
| AVID-2026-R1126 | Apache Airlfow Pig Provider RCE (CVE-2022-40189) | Advisory | 2022-11-22 |
| AVID-2026-R1127 | Vulnerability CVE-2022-40432 | Advisory | 2022-09-19 |
| AVID-2026-R1128 | Vulnerability CVE-2022-40808 | Advisory | 2022-09-19 |
| AVID-2026-R1129 | Vulnerability CVE-2022-40811 | Advisory | 2022-09-19 |
| AVID-2026-R1130 | Apache Airflow Spark Provider RCE that bypass restrictions to read arbitrary files (CVE-2022-40954) | Advisory | 2022-11-22 |
| AVID-2026-R1131 | Vulnerability CVE-2022-41237 | Advisory | 2022-09-21 |
| AVID-2026-R1132 | IBM Watson Knowledge Catalog on Cloud Pak SQL injection (CVE-2022-41731) | Advisory | 2023-02-06 |
| AVID-2026-R1133 | ThreadUnsafeUnigramCandidateSampler Heap out of bounds in Tensorflow (CVE-2022-41880) | Advisory | 2022-11-18 |
| AVID-2026-R1134 | Out of bounds segmentation fault due to unequal op inputs in Tensorflow (CVE-2022-41883) | Advisory | 2022-11-18 |
| AVID-2026-R1135 | Seg fault in `ndarray_tensor_bridge` due to zero and large inputs in Tensorflow (CVE-2022-41884) | Advisory | 2022-11-18 |
| AVID-2026-R1136 | Overflow in `FusedResizeAndPadConv2D` in Tensorflow (CVE-2022-41885) | Advisory | 2022-11-18 |
| AVID-2026-R1137 | Overflow in `ImageProjectiveTransformV2` in Tensorflow (CVE-2022-41886) | Advisory | 2022-11-18 |
| AVID-2026-R1138 | Overflow in `tf.keras.losses.poisson` in Tensorflow (CVE-2022-41887) | Advisory | 2022-11-18 |
| AVID-2026-R1139 | Unckecked rank size in `tf.image.generate_bounding_box_proposals` in Tensorflow (CVE-2022-41888) | Advisory | 2022-11-18 |
| AVID-2026-R1140 | Segfault via invalid attributes in `pywrap_tfe_src.cc` in Tensorflow (CVE-2022-41889) | Advisory | 2022-11-18 |
| AVID-2026-R1141 | `CHECK` fail in `BCast` overflow in Tensorflow (CVE-2022-41890) | Advisory | 2022-11-18 |
| AVID-2026-R1142 | Segfault in `tf.raw_ops.TensorListConcat` in Tensorflow (CVE-2022-41891) | Advisory | 2022-11-18 |
| AVID-2026-R1143 | `CHECK_EQ` fail in `tf.raw_ops.TensorListResize` in Tensorflow (CVE-2022-41893) | Advisory | 2022-11-18 |
| AVID-2026-R1144 | Buffer overflow in `CONV_3D_TRANSPOSE` on TFLite (CVE-2022-41894) | Advisory | 2022-11-18 |
| AVID-2026-R1145 | `MirrorPadGrad` heap out of bounds read in Tensorflow (CVE-2022-41895) | Advisory | 2022-11-18 |
| AVID-2026-R1146 | `tf.raw_ops.Mfcc` crashes in Tensorflow (CVE-2022-41896) | Advisory | 2022-11-18 |
| AVID-2026-R1147 | `FractionalMaxPoolGrad` Heap out of bounds read in Tensorflow (CVE-2022-41897) | Advisory | 2022-11-18 |
| AVID-2026-R1148 | `CHECK` fail via inputs in `SparseFillEmptyRowsGrad` in Tensorflow (CVE-2022-41898) | Advisory | 2022-11-18 |
| AVID-2026-R1149 | `CHECK` fail via inputs in `SdcaOptimizer` in Tensorflow (CVE-2022-41899) | Advisory | 2022-11-18 |
| AVID-2026-R1150 | FractionalMaxPool and FractionalAVGPool heap out-of-bounds acess in Tensorflow (CVE-2022-41900) | Advisory | 2022-11-18 |
| AVID-2026-R1151 | `CHECK_EQ` fail via input in `SparseMatrixNNZ` in Tensorflow (CVE-2022-41901) | Advisory | 2022-11-18 |
| AVID-2026-R1152 | Out of bounds write in grappler in Tensorflow (CVE-2022-41902) | Advisory | 2022-12-06 |
| AVID-2026-R1153 | Overflow in `ResizeNearestNeighborGrad` in Tensorflow (CVE-2022-41907) | Advisory | 2022-11-18 |
| AVID-2026-R1154 | `CHECK` fail via inputs in `PyFunc` in Tensorflow (CVE-2022-41908) | Advisory | 2022-11-18 |
| AVID-2026-R1155 | Segfault in `CompositeTensorVariantToComponents` in Tensorflow (CVE-2022-41909) | Advisory | 2022-11-18 |
| AVID-2026-R1156 | Heap out of bounds read in `QuantizeAndDequantizeV2` in Tensorflow (CVE-2022-41910) | Advisory | 2022-12-06 |
| AVID-2026-R1157 | Invalid char to bool conversion when printing a tensor in Tensorflow (CVE-2022-41911) | Advisory | 2022-11-18 |
| AVID-2026-R1158 | Vulnerability CVE-2022-42036 | Advisory | 2022-10-11 |
| AVID-2026-R1159 | Vulnerability CVE-2022-42037 | Advisory | 2022-10-11 |
| AVID-2026-R1160 | Vulnerability CVE-2022-42039 | Advisory | 2022-10-11 |
| AVID-2026-R1161 | Vulnerability CVE-2022-42041 | Advisory | 2022-10-11 |
| AVID-2026-R1162 | Vulnerability CVE-2022-42042 | Advisory | 2022-10-11 |
| AVID-2026-R1163 | Vulnerability CVE-2022-42044 | Advisory | 2022-10-11 |
| AVID-2026-R1164 | Vulnerability CVE-2022-42261 | Advisory | 2022-12-30 |
| AVID-2026-R1165 | Vulnerability CVE-2022-44054 | Advisory | 2022-11-07 |
| AVID-2026-R1166 | Vulnerability CVE-2022-45907 | Advisory | 2022-11-26 |
| AVID-2026-R1167 | Vulnerability CVE-2022-45908 | Advisory | 2022-11-26 |
| AVID-2026-R1168 | Apache Airflow Hive Provider: Hive Provider RCE vulnerability with hive_cli_params (CVE-2022-46421) | Advisory | 2022-12-20 |
| AVID-2026-R1169 | Apache Airflow: Security vulnerability on AirFlow Connections (CVE-2022-46651) | Advisory | 2023-07-12 |
| AVID-2026-R1170 | Vulnerability CVE-2022-46741 | Advisory | 2022-12-07 |
| AVID-2026-R1171 | Vulnerability CVE-2022-46742 | Advisory | 2022-12-07 |
| AVID-2026-R1172 | Deserializing compromised object with MongoDB .NET/C# Driver may cause remote code execution (CVE-2022-48282) | Advisory | 2023-02-21 |
| AVID-2026-R1173 | Vulnerability CVE-2023-0189 | Advisory | 2023-04-01 |
| AVID-2026-R1174 | Vulnerability CVE-2023-0193 | Advisory | 2023-03-02 |
| AVID-2026-R1175 | Vulnerability CVE-2023-0196 | Advisory | 2023-03-02 |
| AVID-2026-R1176 | Absolute Path Traversal in mlflow/mlflow (CVE-2023-1176) | Advisory | 2023-03-24 |
| AVID-2026-R1177 | ChatBot < 4.4.9 - Subscriber+ OpenAI Settings Update to Stored XSS (CVE-2023-1651) | Advisory | 2023-05-08 |
| AVID-2026-R1178 | Vulnerability CVE-2023-22355 | Advisory | 2023-05-10 |
| AVID-2026-R1179 | Apache Jena: Exposure of arbitrary execution in script engine expressions. (CVE-2023-22665) | Advisory | 2023-04-25 |
| AVID-2026-R1180 | Apache Airflow JDBC Provider: RCE Vulnerability (CVE-2023-22886) | Advisory | 2023-06-29 |
| AVID-2026-R1181 | Azure Machine Learning Compute Instance Information Disclosure Vulnerability (CVE-2023-23382) | Advisory | 2023-02-14 |
| AVID-2026-R1182 | Relative Path Traversal in mlflow/mlflow (CVE-2023-2356) | Advisory | 2023-04-28 |
| AVID-2026-R1183 | vantage6's Pickle serialization is insecure (CVE-2023-23930) | Advisory | 2023-10-11 |
| AVID-2026-R1184 | Vulnerability CVE-2023-25510 | Advisory | 2023-04-22 |
| AVID-2026-R1185 | Vulnerability CVE-2023-25511 | Advisory | 2023-04-22 |
| AVID-2026-R1186 | Vulnerability CVE-2023-25512 | Advisory | 2023-04-22 |
| AVID-2026-R1187 | Vulnerability CVE-2023-25513 | Advisory | 2023-04-22 |
| AVID-2026-R1188 | Vulnerability CVE-2023-25514 | Advisory | 2023-04-22 |
| AVID-2026-R1189 | Vulnerability CVE-2023-25517 | Advisory | 2023-07-03 |
| AVID-2026-R1190 | Vulnerability CVE-2023-25523 | Advisory | 2023-07-03 |
| AVID-2026-R1191 | JupyterHub's LTI13Authenticator: JWT signature not validated (CVE-2023-25574) | Advisory | 2025-02-25 |
| AVID-2026-R1192 | TensorFlow vulnerable to Out-of-Bounds Read in GRUBlockCellGrad (CVE-2023-25658) | Advisory | 2023-03-24 |
| AVID-2026-R1193 | TensorFlow vulnerable to Out-of-Bounds Read in DynamicStitch (CVE-2023-25659) | Advisory | 2023-03-24 |
| AVID-2026-R1194 | TensorFlow vulnerable to seg fault in `tf.raw_ops.Print` (CVE-2023-25660) | Advisory | 2023-03-24 |
| AVID-2026-R1195 | TensorFlow vulnerable to integer overflow in EditDistance (CVE-2023-25662) | Advisory | 2023-03-24 |
| AVID-2026-R1196 | TensorFlow has Null Pointer Error in TensorArrayConcatV2 (CVE-2023-25663) | Advisory | 2023-03-24 |
| AVID-2026-R1197 | TensorFlow vulnerable to Heap Buffer Overflow in AvgPoolGrad (CVE-2023-25664) | Advisory | 2023-03-24 |
| AVID-2026-R1198 | TensorFlow has Floating Point Exception in AudioSpectrogram (CVE-2023-25666) | Advisory | 2023-03-24 |
| AVID-2026-R1199 | TensorFlow vulnerable to segfault when opening multiframe gif (CVE-2023-25667) | Advisory | 2023-03-24 |
| AVID-2026-R1200 | TensorFlow vulnerable to heap out-of-buffer read in the QuantizeAndDequantize operation (CVE-2023-25668) | Advisory | 2023-03-24 |
| AVID-2026-R1201 | TensorFlow has Floating Point Exception in AvgPoolGrad with XLA (CVE-2023-25669) | Advisory | 2023-03-24 |
| AVID-2026-R1202 | TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize (CVE-2023-25670) | Advisory | 2023-03-24 |
| AVID-2026-R1203 | TensorFlow has segmentation fault in tfg-translate (CVE-2023-25671) | Advisory | 2023-03-24 |
| AVID-2026-R1204 | TensorFlow has Null Pointer Error in LookupTableImportV2 (CVE-2023-25672) | Advisory | 2023-03-24 |
| AVID-2026-R1205 | TensorFlow has Floating Point Exception in TensorListSplit with XLA (CVE-2023-25673) | Advisory | 2023-03-24 |
| AVID-2026-R1206 | TensorFlow has Null Pointer Error in RandomShuffle with XLA enable (CVE-2023-25674) | Advisory | 2023-03-24 |
| AVID-2026-R1207 | TensorFlow has Segfault in Bincount with XLA (CVE-2023-25675) | Advisory | 2023-03-24 |
| AVID-2026-R1208 | TensorFlow has null dereference on ParallelConcat with XLA (CVE-2023-25676) | Advisory | 2023-03-24 |
| AVID-2026-R1209 | Apache Airflow Google Provider: Google Cloud Sql Provider Remote Command Execution (CVE-2023-25691) | Advisory | 2023-02-24 |
| AVID-2026-R1210 | Sqoop Apache Airflow Provider Remote Code Execution Vulnerability (CVE-2023-25693) | Advisory | 2023-02-24 |
| AVID-2026-R1211 | Information disclosure in Apache Airflow (CVE-2023-25695) | Advisory | 2023-03-15 |
| AVID-2026-R1212 | AI-Engine < 1.6.83 - Admin+ Stored XSS (CVE-2023-2580) | Advisory | 2023-06-27 |
| AVID-2026-R1213 | TensorFlow has double free in Fractional(Max/Avg)Pool (CVE-2023-25801) | Advisory | 2023-03-24 |
| AVID-2026-R1214 | ReportPortal DoS vulnerability on creating a Launch with too many recursively nested elements (CVE-2023-25822) | Advisory | 2023-10-09 |
| AVID-2026-R1215 | Gradio contains Use of Hard-coded Credentials (CVE-2023-25823) | Advisory | 2023-02-23 |
| AVID-2026-R1216 | Apache Airflow AWS Provider: Arbitrary file read via AWS provider (CVE-2023-25956) | Advisory | 2023-02-24 |
| AVID-2026-R1217 | OpenCV wechat_qrcode Module decoded_bit_stream_parser.cpp decodeHanziSegment memory leak (CVE-2023-2618) | Advisory | 2023-05-10 |
| AVID-2026-R1218 | Vulnerability CVE-2023-26263 | Advisory | 2023-04-13 |
| AVID-2026-R1219 | IBM Watson CP4D Data Stores file modificiation (CVE-2023-26282) | Advisory | 2024-03-05 |
| AVID-2026-R1220 | Apache EventMesh RabbitMQ-Connector plugin allows RCE through deserialization of untrusted data (CVE-2023-26512) | Advisory | 2023-07-17 |
| AVID-2026-R1221 | IBM Watson CP4D Data Stores information disclosure (CVE-2023-27291) | Advisory | 2024-03-03 |
| AVID-2026-R1222 | Vulnerability CVE-2023-27506 | Advisory | 2023-08-11 |
| AVID-2026-R1223 | IBM Watson CP4D Data Stores denial of service (CVE-2023-27540) | Advisory | 2023-07-10 |
| AVID-2026-R1224 | IBM Watson CloudPak for Data Data Stores information disclosure (CVE-2023-27545) | Advisory | 2024-02-29 |
| AVID-2026-R1225 | TensorFlow has Floating Point Exception in TFLite in conv kernel (CVE-2023-27579) | Advisory | 2023-03-24 |
| AVID-2026-R1226 | Apache Airflow Sqoop Provider: Airflow Sqoop Provider RCE Vulnerability (CVE-2023-27604) | Advisory | 2023-08-28 |
| AVID-2026-R1227 | Insecure Temporary File in huggingface/transformers (CVE-2023-2800) | Advisory | 2023-05-18 |
| AVID-2026-R1228 | Vulnerability CVE-2023-28380 | Advisory | 2023-08-11 |
| AVID-2026-R1229 | Vulnerability CVE-2023-28405 | Advisory | 2023-08-11 |
| AVID-2026-R1230 | IBM Watson CP4D Data Stores improper input validation (CVE-2023-28512) | Advisory | 2024-03-03 |
| AVID-2026-R1231 | Apache Airflow Hive Provider Beeline Remote Command Execution (CVE-2023-28706) | Advisory | 2023-04-07 |
| AVID-2026-R1232 | Apache Airflow Spark Provider Arbitrary File Read via JDBC (CVE-2023-28710) | Advisory | 2023-04-07 |
| AVID-2026-R1233 | Apache Linkis DatasourceManager module has a deserialization command execution (CVE-2023-29216) | Advisory | 2023-04-10 |
| AVID-2026-R1234 | MindSpore json_helper.cc UpdateArray memory corruption (CVE-2023-2970) | Advisory | 2023-05-30 |
| AVID-2026-R1235 | Vulnerability CVE-2023-30172 | Advisory | 2023-05-11 |
| AVID-2026-R1236 | IBM Watson Machine Learning on Cloud Pak for Data server-side request forgery (CVE-2023-30444) | Advisory | 2023-04-27 |
| AVID-2026-R1237 | Arbitrary File Write when Extracting a Remotely retrieved Tarball in mindsdb/mindsdb (CVE-2023-30620) | Advisory | 2023-04-21 |
| AVID-2026-R1238 | Vulnerability CVE-2023-30767 | Advisory | 2024-02-14 |
| AVID-2026-R1239 | CVE (CVE-2023-31036) | Advisory | 2024-01-12 |
| AVID-2026-R1240 | in-toto vulnerable to Configuration Read From Local Directory (CVE-2023-32076) | Advisory | 2023-05-10 |
| AVID-2026-R1241 | Planet's secret file is created with excessive permissions (CVE-2023-32303) | Advisory | 2023-05-12 |
| AVID-2026-R1242 | Sqlite-jdbc vulnerable to remote code execution when JDBC url is attacker controlled (CVE-2023-32697) | Advisory | 2023-05-23 |
| AVID-2026-R1243 | malformed proposed intoto v0.0.2 entries can cause a panic in Rekor (CVE-2023-33199) | Advisory | 2023-05-26 |
| AVID-2026-R1244 | S3 credentials included when exporting elyra notebook (CVE-2023-3361) | Advisory | 2023-10-04 |
| AVID-2026-R1245 | TensorFlow segfault in array_ops.upper_bound (CVE-2023-33976) | Advisory | 2024-07-30 |
| AVID-2026-R1246 | Java Deserialization vulnerability in Spring-Kafka When Improperly Configured (CVE-2023-34040) | Advisory | 2023-08-24 |
| AVID-2026-R1247 | Snowflake Python Connector vulnerable to Command Injection (CVE-2023-34233) | Advisory | 2023-06-08 |
| AVID-2026-R1248 | Apache Airflow ODBC Provider: Remote code execution vulnerability (CVE-2023-34395) | Advisory | 2023-06-27 |
| AVID-2026-R1249 | Apache Airflow Hive Provider Beeline RCE with Principal (CVE-2023-35797) | Advisory | 2023-07-03 |
| AVID-2026-R1250 | Dependency cache path traversal in Gradle (CVE-2023-35946) | Advisory | 2023-06-30 |
| AVID-2026-R1251 | Visual Studio Code Jupyter Extension Spoofing Vulnerability (CVE-2023-36018) | Advisory | 2023-11-14 |
| AVID-2026-R1252 | Vulnerability CVE-2023-36189 | Advisory | 2023-07-06 |
| AVID-2026-R1253 | Vulnerability CVE-2023-36281 | Advisory | 2023-08-22 |
| AVID-2026-R1254 | Azure Identity SDK Remote Code Execution Vulnerability (CVE-2023-36414) | Advisory | 2023-10-10 |
| AVID-2026-R1255 | AWS data.all vulnerable to RCE through user injection of Python Commands (CVE-2023-36467) | Advisory | 2023-06-28 |
| AVID-2026-R1256 | Apache Airflow: Exposure of sensitive connection information, DOS and SSRF on "test connection" feature (CVE-2023-37379) | Advisory | 2023-08-23 |
| AVID-2026-R1257 | Apache Pulsar Function Worker: Incorrect Authorization for Function Worker Can Leak Sink/Source Credentials (CVE-2023-37579) | Advisory | 2023-07-12 |
| AVID-2026-R1258 | Absolute Path Traversal in mlflow/mlflow (CVE-2023-3765) | Advisory | 2023-07-19 |
| AVID-2026-R1259 | Vulnerability CVE-2023-38669 | Advisory | 2023-07-26 |
| AVID-2026-R1260 | Null pointer dereference in paddle.flip (CVE-2023-38670) | Advisory | 2023-07-26 |
| AVID-2026-R1261 | Heap buffer overflow in paddle.trace (CVE-2023-38671) | Advisory | 2023-07-26 |
| AVID-2026-R1262 | FPE in paddle.nanmedian (CVE-2023-38674) | Advisory | 2024-01-03 |
| AVID-2026-R1263 | FPE in paddle.linalg.matrix_rank (CVE-2023-38675) | Advisory | 2024-01-03 |
| AVID-2026-R1264 | Segfault in paddle.dot (CVE-2023-38676) | Advisory | 2024-01-03 |
| AVID-2026-R1265 | FPE in paddle.linalg.eig (CVE-2023-38677) | Advisory | 2024-01-03 |
| AVID-2026-R1266 | MindsDB 'Call to requests with verify=False disabling SSL certificate checks, security issue.' issue (CVE-2023-38699) | Advisory | 2023-08-04 |
| AVID-2026-R1267 | Vulnerability CVE-2023-38976 | Advisory | 2023-08-21 |
| AVID-2026-R1268 | Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK (CVE-2023-39410) | Advisory | 2023-09-29 |
| AVID-2026-R1269 | Vulnerability CVE-2023-39659 | Advisory | 2023-08-15 |
| AVID-2026-R1270 | Vulnerability CVE-2023-39660 | Advisory | 2023-08-21 |
| AVID-2026-R1271 | Vulnerability CVE-2023-39662 | Advisory | 2023-08-15 |
| AVID-2026-R1272 | Open Redirect Vulnerability in jupyter-server (CVE-2023-39968) | Advisory | 2023-08-28 |
| AVID-2026-R1273 | Apache Airflow Spark Provider Deserialization Vulnerability RCE (CVE-2023-40195) | Advisory | 2023-08-28 |
| AVID-2026-R1274 | Apache Airflow Spark Provider Arbitrary File Read via JDBC (CVE-2023-40272) | Advisory | 2023-08-17 |
| AVID-2026-R1275 | OS Command Injection in mlflow/mlflow (CVE-2023-4033) | Advisory | 2023-08-01 |
| AVID-2026-R1276 | IBM Watson CP4D Data Stores information disclosure (CVE-2023-40694) | Advisory | 2024-05-07 |
| AVID-2026-R1277 | Remote Code Execution in Custom Integration Upload in Fides (CVE-2023-41319) | Advisory | 2023-09-06 |
| AVID-2026-R1278 | Vulnerability CVE-2023-41626 | Advisory | 2023-09-15 |
| AVID-2026-R1279 | Apache Airflow: Improper access control to DAG resources (CVE-2023-42792) | Advisory | 2023-10-14 |
| AVID-2026-R1280 | TorchServe Server-Side Request Forgery (CVE-2023-43654) | Advisory | 2023-09-28 |
| AVID-2026-R1281 | Trojan Lockfilein pdm (CVE-2023-45805) | Advisory | 2023-10-20 |
| AVID-2026-R1282 | D-Tale vulnerable to Remote Code Execution through the Custom Filter Input (CVE-2023-46134) | Advisory | 2023-10-25 |
| AVID-2026-R1283 | Vulnerability CVE-2023-46229 | Advisory | 2023-10-19 |
| AVID-2026-R1284 | Apache Submarine: Fix CVE-2022-1471 SnakeYaml unsafe deserialization (CVE-2023-46302) | Advisory | 2023-11-20 |
| AVID-2026-R1285 | Vulnerability CVE-2023-46492 | Advisory | 2023-11-09 |
| AVID-2026-R1286 | Elasticsearch-hadoop Unsafe Deserialization (CVE-2023-46674) | Advisory | 2023-12-05 |
| AVID-2026-R1287 | Apache Airflow missing fix for CVE-2023-40611 in 2.7.1 (DAG run broken access) (CVE-2023-47037) | Advisory | 2023-11-12 |
| AVID-2026-R1288 | Object Relational Mapper Leak Vulnerability in Filtering Task in Label Studio (CVE-2023-47117) | Advisory | 2023-11-13 |
| AVID-2026-R1289 | PyArrow, PyArrow: Arbitrary code execution when loading a malicious data file (CVE-2023-47248) | Advisory | 2023-11-09 |
| AVID-2026-R1290 | Inconsistent interpretation of `Content-Length` vs. `Transfer-Encoding` in aiohttp (CVE-2023-47641) | Advisory | 2023-11-14 |
| AVID-2026-R1291 | Vulnerability CVE-2023-48022 | Advisory | 2023-11-28 |
| AVID-2026-R1292 | Vulnerability CVE-2023-48023 | Advisory | 2023-11-28 |
| AVID-2026-R1293 | Apache Airflow: Improper access control to DAG resources (CVE-2023-48291) | Advisory | 2023-12-21 |
| AVID-2026-R1294 | TorchServe ZipSlip (CVE-2023-48299) | Advisory | 2023-11-21 |
| AVID-2026-R1295 | Authentication Bypass by Primary Weakness in mintplex-labs/anything-llm (CVE-2023-4898) | Advisory | 2023-09-11 |
| AVID-2026-R1296 | SQL Injection in mintplex-labs/anything-llm (CVE-2023-4899) | Advisory | 2023-09-11 |
| AVID-2026-R1297 | Unsafe YAML deserialization in PyDrive2 (CVE-2023-49297) | Advisory | 2023-12-05 |
| AVID-2026-R1298 | MindsDB Server-Side Request Forgery vulnerability (CVE-2023-49795) | Advisory | 2023-12-11 |
| AVID-2026-R1299 | MindsDB Arbitrary File Write vulnerability (CVE-2023-49796) | Advisory | 2023-12-11 |
| AVID-2026-R1300 | Vulnerability CVE-2023-50447 | Advisory | 2024-01-19 |
| AVID-2026-R1301 | MindsDB has arbitrary file write in file.py (CVE-2023-50731) | Advisory | 2023-12-22 |
| AVID-2026-R1302 | WordPress AI Engine plugin <= 1.9.98 - Unauthenticated Arbitrary File Upload vulnerability (CVE-2023-51409) | Advisory | 2024-04-12 |
| AVID-2026-R1303 | Apache Pulsar: Timing attack in SASL token signature verification (CVE-2023-51437) | Advisory | 2024-02-07 |
| AVID-2026-R1304 | Make the `/file` secure against file traversal attacks (CVE-2023-51449) | Advisory | 2023-12-22 |
| AVID-2026-R1305 | Segfault in paddle.nextafter (CVE-2023-52302) | Advisory | 2024-01-03 |
| AVID-2026-R1306 | Segfault in paddle.put_along_axis (CVE-2023-52303) | Advisory | 2024-01-03 |
| AVID-2026-R1307 | Stack overflow in paddle.searchsorted (CVE-2023-52304) | Advisory | 2024-01-03 |
| AVID-2026-R1308 | FPE in paddle.topk (CVE-2023-52305) | Advisory | 2024-01-03 |
| AVID-2026-R1309 | FPE in paddle.lerp (CVE-2023-52306) | Advisory | 2024-01-03 |
| AVID-2026-R1310 | Stack overflow in paddle.linalg.lu_unpack (CVE-2023-52307) | Advisory | 2024-01-03 |
| AVID-2026-R1311 | FPE in paddle.amin (CVE-2023-52308) | Advisory | 2024-01-03 |
| AVID-2026-R1312 | Heap buffer overflow in paddle.repeat_interleave (CVE-2023-52309) | Advisory | 2024-01-03 |
| AVID-2026-R1313 | Command injection in get_online_pass_interval (CVE-2023-52310) | Advisory | 2024-01-03 |
| AVID-2026-R1314 | Command injection in _wget_download (CVE-2023-52311) | Advisory | 2024-01-03 |
| AVID-2026-R1315 | Null pointer dereference in paddle.crop (CVE-2023-52312) | Advisory | 2024-01-03 |
| AVID-2026-R1316 | FPE in paddle.argmin and paddle.argmax (CVE-2023-52313) | Advisory | 2024-01-03 |
| AVID-2026-R1317 | Command injection in convert_shape_compare (CVE-2023-52314) | Advisory | 2024-01-03 |
| AVID-2026-R1318 | Vulnerability CVE-2023-5241 | Advisory | 2023-10-19 |
| AVID-2026-R1319 | Using MLeap for loading a saved model (zip archive) can lead to path traversal/arbitrary file creation and possibly remote code execution. (CVE-2023-5245) | Advisory | 2023-11-15 |
| AVID-2026-R1320 | Vulnerability CVE-2023-5534 | Advisory | 2023-10-20 |
| AVID-2026-R1321 | H2O Local File Include (CVE-2023-6013) | Advisory | 2023-11-16 |
| AVID-2026-R1322 | H2O Remote Code Execution via POJO Model Import (CVE-2023-6016) | Advisory | 2023-11-16 |
| AVID-2026-R1323 | MLflow Arbitrary File Write (CVE-2023-6018) | Advisory | 2023-11-16 |
| AVID-2026-R1324 | Ray Command Injection in cpu_profile Parameter (CVE-2023-6019) | Advisory | 2023-11-16 |
| AVID-2026-R1325 | Ray Log File Local File Include (CVE-2023-6021) | Advisory | 2023-11-16 |
| AVID-2026-R1326 | Cross-Site Request Forgery (CSRF) in prefecthq/prefect (CVE-2023-6022) | Advisory | 2023-11-16 |
| AVID-2026-R1327 | Reflected XSS via Content-Type Header in mlflow/mlflow (CVE-2023-6568) | Advisory | 2023-12-07 |
| AVID-2026-R1328 | External Control of File Name or Path in h2oai/h2o-3 (CVE-2023-6569) | Advisory | 2023-12-14 |
| AVID-2026-R1329 | Server-Side Request Forgery (SSRF) in kubeflow/kubeflow (CVE-2023-6570) | Advisory | 2023-12-14 |
| AVID-2026-R1330 | Cross-site Scripting (XSS) - Reflected in kubeflow/kubeflow (CVE-2023-6571) | Advisory | 2023-12-14 |
| AVID-2026-R1331 | Path Traversal in mlflow/mlflow (CVE-2023-6753) | Advisory | 2023-12-13 |
| AVID-2026-R1332 | Cross-site Scripting (XSS) - Stored in allegroai/clearml-server (CVE-2023-6778) | Advisory | 2023-12-18 |
| AVID-2026-R1333 | Path Traversal: '\.. ilename' in mlflow/mlflow (CVE-2023-6831) | Advisory | 2023-12-15 |
| AVID-2026-R1334 | Path Traversal: '\.. ilename' in mlflow/mlflow (CVE-2023-6909) | Advisory | 2023-12-18 |
| AVID-2026-R1335 | Command Injection (CVE-2023-6940) | Advisory | 2023-12-19 |
| AVID-2026-R1336 | Server-Side Request Forgery (SSRF) (CVE-2023-6974) | Advisory | 2023-12-20 |
| AVID-2026-R1337 | Unrestricted Upload of File with Dangerous Type (CVE-2023-6976) | Advisory | 2023-12-20 |
| AVID-2026-R1338 | Deserialization of Untrusted Data in huggingface/transformers (CVE-2023-7018) | Advisory | 2023-12-20 |
| AVID-2026-R1339 | Vulnerability CVE-2024-0072 | Advisory | 2024-04-05 |
| AVID-2026-R1340 | Vulnerability CVE-2024-0076 | Advisory | 2024-04-05 |
| AVID-2026-R1341 | CVE (CVE-2024-0087) | Advisory | 2024-05-09 |
| AVID-2026-R1342 | CVE (CVE-2024-0095) | Advisory | 2024-06-13 |
| AVID-2026-R1343 | CVE (CVE-2024-0100) | Advisory | 2024-05-09 |
| AVID-2026-R1344 | Vulnerability CVE-2024-0102 | Advisory | 2024-08-08 |
| AVID-2026-R1345 | CVE (CVE-2024-0103) | Advisory | 2024-06-13 |
| AVID-2026-R1346 | Vulnerability CVE-2024-0109 | Advisory | 2024-08-31 |
| AVID-2026-R1347 | Vulnerability CVE-2024-0110 | Advisory | 2024-08-31 |
| AVID-2026-R1348 | Vulnerability CVE-2024-0115 | Advisory | 2024-08-09 |
| AVID-2026-R1349 | Vulnerability CVE-2024-0116 | Advisory | 2024-10-01 |
| AVID-2026-R1350 | Vulnerability CVE-2024-0125 | Advisory | 2024-10-03 |
| AVID-2026-R1351 | Vulnerability CVE-2024-0140 | Advisory | 2025-01-28 |
| AVID-2026-R1352 | Vulnerability CVE-2024-0378 | Advisory | 2024-03-02 |
| AVID-2026-R1353 | AI ChatBot <= 5.3.4 - Missing Authorization via openai_file_list_callback (CVE-2024-0451) | Advisory | 2024-05-22 |
| AVID-2026-R1354 | AI ChatBot <= 5.3.4 - Missing Authorization via openai_file_delete_callback (CVE-2024-0453) | Advisory | 2024-05-22 |
| AVID-2026-R1355 | Remote Code Execution due to Full Controlled File Write in mlflow/mlflow (CVE-2024-0520) | Advisory | 2024-06-06 |
| AVID-2026-R1356 | Download and export of file via default user role (CVE-2024-0551) | Advisory | 2024-02-27 |
| AVID-2026-R1357 | DeepFaceLab Util.py deserialization (CVE-2024-0654) | Advisory | 2024-01-18 |
| AVID-2026-R1358 | Improper validation of document removal parameter (CVE-2024-0763) | Advisory | 2024-02-27 |
| AVID-2026-R1359 | Vulnerability CVE-2024-0815 | Advisory | 2024-03-07 |
| AVID-2026-R1360 | Vulnerability CVE-2024-0818 | Advisory | 2024-03-07 |
| AVID-2026-R1361 | Vulnerability CVE-2024-0917 | Advisory | 2024-03-07 |
| AVID-2026-R1362 | Path Traversal and OS Command Injection in parisneo/lollms-webui (CVE-2024-10019) | Advisory | 2025-03-20 |
| AVID-2026-R1363 | flairNLP flair Mode File Loader clustering.py ClusteringModel code injection (CVE-2024-10073) | Advisory | 2024-10-17 |
| AVID-2026-R1364 | Stored XSS in comfyanonymous/comfyui (CVE-2024-10099) | Advisory | 2024-10-17 |
| AVID-2026-R1365 | Remote Code Execution in infiniflow/ragflow (CVE-2024-10131) | Advisory | 2024-10-19 |
| AVID-2026-R1366 | Unauthenticated Remote Code Execution in ElasticRendezvousHandler in horovod/horovod (CVE-2024-10190) | Advisory | 2025-03-20 |
| AVID-2026-R1367 | chidiwilliams buzz model_loader.py download_model temp file (CVE-2024-10372) | Advisory | 2024-10-25 |
| AVID-2026-R1368 | Denial of Service by ReDOS in h2oai/h2o-3 (CVE-2024-10549) | Advisory | 2025-03-20 |
| AVID-2026-R1369 | Denial of Service by ReDOS in h2oai/h2o-3 (CVE-2024-10550) | Advisory | 2025-03-20 |
| AVID-2026-R1370 | Jdbc Deserialization in h2oai/h2o-3 (CVE-2024-10553) | Advisory | 2025-03-20 |
| AVID-2026-R1371 | Denial of Service and Arbitrary File Write in h2oai/h2o-3 (CVE-2024-10572) | Advisory | 2025-03-20 |
| AVID-2026-R1372 | Regular Expression Denial of Service (ReDoS) in gradio-app/gradio (CVE-2024-10624) | Advisory | 2025-03-20 |
| AVID-2026-R1373 | Path Traversal in gradio-app/gradio (CVE-2024-10648) | Advisory | 2025-03-20 |
| AVID-2026-R1374 | Open Redirect in binary-husky/gpt_academic (CVE-2024-10812) | Advisory | 2025-03-20 |
| AVID-2026-R1375 | Deserialization of Untrusted Data in binary-husky/gpt_academic (CVE-2024-11039) | Advisory | 2025-03-20 |
| AVID-2026-R1376 | Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2024-11392) | Advisory | 2024-11-22 |
| AVID-2026-R1377 | Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2024-11393) | Advisory | 2024-11-22 |
| AVID-2026-R1378 | Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2024-11394) | Advisory | 2024-11-22 |
| AVID-2026-R1379 | CORS Vulnerability in feast-dev/feast (CVE-2024-11602) | Advisory | 2025-03-20 |
| AVID-2026-R1380 | Privilege Escalation in langgenius/dify (CVE-2024-11821) | Advisory | 2025-03-20 |
| AVID-2026-R1381 | Remote Code Execution by Pickle Deserialization in open-mmlab/mmdetection (CVE-2024-12044) | Advisory | 2025-03-20 |
| AVID-2026-R1382 | Server-Side Request Forgery in haotian-liu/llava (CVE-2024-12068) | Advisory | 2025-03-20 |
| AVID-2026-R1383 | Remote Code Execution in kedro-org/kedro (CVE-2024-12215) | Advisory | 2025-03-20 |
| AVID-2026-R1384 | Arbitrary File Write via TarSlip in dmlc/gluon-cv (CVE-2024-12216) | Advisory | 2025-03-20 |
| AVID-2026-R1385 | Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text & Image Generator <= 1.3.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Upload (CVE-2024-12471) | Advisory | 2025-01-07 |
| AVID-2026-R1386 | Regular Expression Denial of Service (ReDoS) in huggingface/transformers (CVE-2024-12720) | Advisory | 2025-03-20 |
| AVID-2026-R1387 | Dependency on Vulnerable Third-Party Component exposes Vulnerabilities in NI Vision Software (CVE-2024-12740) | Advisory | 2025-01-27 |
| AVID-2026-R1388 | SQL Injection in the Amazon Redshift Python Connector affecting v2.1.4 (CVE-2024-12745) | Advisory | 2024-12-24 |
| AVID-2026-R1389 | SSRF in langgenius/dify (CVE-2024-12775) | Advisory | 2025-03-20 |
| AVID-2026-R1390 | Denial of Service in aimhubio/aim (CVE-2024-12777) | Advisory | 2025-03-20 |
| AVID-2026-R1391 | Path Traversal in mintplex-labs/anything-llm (CVE-2024-13059) | Advisory | 2025-02-10 |
| AVID-2026-R1392 | DeepFaceLab main.py apply_xseg deserialization (CVE-2024-1432) | Advisory | 2024-02-11 |
| AVID-2026-R1393 | S3 Bucket Takeover in h2oai/h2o-3 (CVE-2024-1456) | Advisory | 2024-04-16 |
| AVID-2026-R1394 | Path Traversal Vulnerability in mlflow/mlflow (CVE-2024-1483) | Advisory | 2024-04-16 |
| AVID-2026-R1395 | Path Traversal Vulnerability in parisneo/lollms-webui (CVE-2024-1511) | Advisory | 2024-04-10 |
| AVID-2026-R1396 | Cross-Site Request Forgery (CSRF) Leading to Remote Code Execution in parisneo/lollms-webui (CVE-2024-1522) | Advisory | 2024-03-30 |
| AVID-2026-R1397 | Command Injection in gradio-app/gradio via deploy+test-visual.yml workflow (CVE-2024-1540) | Advisory | 2024-03-27 |
| AVID-2026-R1398 | Stored XSS leading to RCE in parisneo/lollms-webui (CVE-2024-1602) | Advisory | 2024-04-10 |
| AVID-2026-R1399 | confirmed (CVE-2024-1603) | Advisory | 2024-03-23 |
| AVID-2026-R1400 | Local File Inclusion in gradio-app/gradio (CVE-2024-1728) | Advisory | 2024-04-10 |
| AVID-2026-R1401 | CSRF to RCE in significant-gravitas/autogpt (CVE-2024-1879) | Advisory | 2024-06-06 |
| AVID-2026-R1402 | Session Reuse Vulnerability in lunary-ai/lunary (CVE-2024-1902) | Advisory | 2024-04-10 |
| AVID-2026-R1403 | Path Traversal leading to Arbitrary File Write and RCE in vertaai/modeldb (CVE-2024-1961) | Advisory | 2024-04-16 |
| AVID-2026-R1404 | Command Injection in mudler/localai (CVE-2024-2029) | Advisory | 2024-04-10 |
| AVID-2026-R1405 | Directory Traversal in zenml-io/zenml (CVE-2024-2083) | Advisory | 2024-04-16 |
| AVID-2026-R1406 | Azure SDK Spoofing Vulnerability (CVE-2024-21421) | Advisory | 2024-03-12 |
| AVID-2026-R1407 | Vulnerability CVE-2024-21485 | Advisory | 2024-02-02 |
| AVID-2026-R1408 | Vulnerability CVE-2024-21552 | Advisory | 2024-07-22 |
| AVID-2026-R1409 | Vulnerability CVE-2024-21574 | Advisory | 2024-12-12 |
| AVID-2026-R1410 | Vulnerability CVE-2024-21577 | Advisory | 2024-12-13 |
| AVID-2026-R1411 | Remote code execution (CVE-2024-21649) | Advisory | 2024-01-30 |
| AVID-2026-R1412 | vantage6 insecure SSH configuration for node and server containers (CVE-2024-21653) | Advisory | 2024-01-30 |
| AVID-2026-R1413 | Vulnerability CVE-2024-21766 | Advisory | 2024-08-14 |
| AVID-2026-R1414 | Path Traversal Vulnerability in parisneo/lollms-webui (CVE-2024-2178) | Advisory | 2024-06-02 |
| AVID-2026-R1415 | Vulnerability CVE-2024-21792 | Advisory | 2024-05-16 |
| AVID-2026-R1416 | Vulnerability CVE-2024-21799 | Advisory | 2024-11-13 |
| AVID-2026-R1417 | Vulnerability CVE-2024-21802 | Advisory | 2024-02-26 |
| AVID-2026-R1418 | Vulnerability CVE-2024-21949 | Advisory | 2024-11-12 |
| AVID-2026-R1419 | Remote Code Execution in aimhubio/aim (CVE-2024-2195) | Advisory | 2024-04-10 |
| AVID-2026-R1420 | Vulnerability CVE-2024-21974 | Advisory | 2024-11-12 |
| AVID-2026-R1421 | Vulnerability CVE-2024-21975 | Advisory | 2024-11-12 |
| AVID-2026-R1422 | SSRF Vulnerability in gradio-app/gradio (CVE-2024-2206) | Advisory | 2024-03-27 |
| AVID-2026-R1423 | Path Traversal and Arbitrary File Upload Vulnerability in qdrant/qdrant (CVE-2024-2221) | Advisory | 2024-04-10 |
| AVID-2026-R1424 | Spring Cloud Function Web DOS Vulnerability (CVE-2024-22271) | Advisory | 2024-07-09 |
| AVID-2026-R1425 | Unsecured endpoints in the jupyter-lsp server extension (CVE-2024-22415) | Advisory | 2024-01-18 |
| AVID-2026-R1426 | Vulnerability CVE-2024-22476 | Advisory | 2024-05-16 |
| AVID-2026-R1427 | Client configured with permissive trust policies susceptible to rollback attack in Notary Project (CVE-2024-23332) | Advisory | 2024-01-19 |
| AVID-2026-R1428 | python-ecdsa vulnerable to Minerva attack on P-256 (CVE-2024-23342) | Advisory | 2024-01-22 |
| AVID-2026-R1429 | Vulnerability CVE-2024-23496 | Advisory | 2024-02-26 |
| AVID-2026-R1430 | Path Traversal leading to Remote Code Execution in parisneo/lollms-webui (CVE-2024-2358) | Advisory | 2024-05-16 |
| AVID-2026-R1431 | Improper Neutralization of Special Elements used in an OS Command in parisneo/lollms-webui (CVE-2024-2359) | Advisory | 2024-06-06 |
| AVID-2026-R1432 | Vulnerability CVE-2024-23750 | Advisory | 2024-01-22 |
| AVID-2026-R1433 | Vulnerability CVE-2024-23751 | Advisory | 2024-01-22 |
| AVID-2026-R1434 | CORS settings overly permissive in vantage6 (CVE-2024-23823) | Advisory | 2024-03-14 |
| AVID-2026-R1435 | Use after free in C++ protobuf (CVE-2024-2410) | Advisory | 2024-05-03 |
| AVID-2026-R1436 | Vulnerability CVE-2024-24590 | Advisory | 2024-02-06 |
| AVID-2026-R1437 | Vulnerability CVE-2024-24591 | Advisory | 2024-02-06 |
| AVID-2026-R1438 | Vulnerability CVE-2024-24593 | Advisory | 2024-02-06 |
| AVID-2026-R1439 | MindsDB Vulnerable to Bypass of SSRF Protection with DNS Rebinding (CVE-2024-24759) | Advisory | 2024-09-05 |
| AVID-2026-R1440 | RedisBloom heap buffer overflow in CF.LOADCHUNK command (CVE-2024-25115) | Advisory | 2024-04-09 |
| AVID-2026-R1441 | Vulnerability CVE-2024-25723 | Advisory | 2024-02-27 |
| AVID-2026-R1442 | Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. (CVE-2024-27133) | Advisory | 2024-02-23 |
| AVID-2026-R1443 | Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf (CVE-2024-27134) | Advisory | 2024-11-25 |
| AVID-2026-R1444 | Apache Pulsar: Improper Input Validation in Pulsar Function Worker allows Remote Code Execution (CVE-2024-27135) | Advisory | 2024-03-12 |
| AVID-2026-R1445 | Apache Pulsar: Pulsar Functions Worker's Archive Extraction Vulnerability Allows Unauthorized File Modification (CVE-2024-27317) | Advisory | 2024-03-12 |
| AVID-2026-R1446 | Vulnerability CVE-2024-27318 | Advisory | 2024-02-23 |
| AVID-2026-R1447 | Vulnerability CVE-2024-27319 | Advisory | 2024-02-23 |
| AVID-2026-R1448 | Apache Pulsar: Pulsar Functions Worker Allows Unauthorized File Access and Unauthorized HTTP/HTTPS Proxying (CVE-2024-27894) | Advisory | 2024-03-12 |
| AVID-2026-R1449 | Jupyter Server Proxy's Websocket Proxying does not require authentication (CVE-2024-28179) | Advisory | 2024-03-20 |
| AVID-2026-R1450 | jupyter-scheduler's endpoint is missing authentication (CVE-2024-28188) | Advisory | 2024-05-23 |
| AVID-2026-R1451 | Vulnerability CVE-2024-28950 | Advisory | 2024-11-13 |
| AVID-2026-R1452 | Vulnerability CVE-2024-29083 | Advisory | 2024-11-13 |
| AVID-2026-R1453 | WordPress AI Engine plugin <= 2.1.4 - Arbitrary File Upload vulnerability (CVE-2024-29100) | Advisory | 2024-03-28 |
| AVID-2026-R1454 | Insecure Deserialization Leading to RCE in bentoml/bentoml (CVE-2024-2912) | Advisory | 2024-04-16 |
| AVID-2026-R1455 | TarSlip Vulnerability in deepjavalibrary/djl (CVE-2024-2914) | Advisory | 2024-06-06 |
| AVID-2026-R1456 | Local File Inclusion (LFI) via URI Fragment Parsing in mlflow/mlflow (CVE-2024-2928) | Advisory | 2024-06-06 |
| AVID-2026-R1457 | Cosign vulnerable to machine-wide denial of service via malicious artifacts (CVE-2024-29903) | Advisory | 2024-04-10 |
| AVID-2026-R1458 | Qdrant Full Snapshot REST API snapshots.rs path traversal (CVE-2024-3078) | Advisory | 2024-03-29 |
| AVID-2026-R1459 | Privilege Escalation via Improper Input Validation in mintplex-labs/anything-llm (CVE-2024-3101) | Advisory | 2024-04-10 |
| AVID-2026-R1460 | Remote Code Execution in mintplex-labs/anything-llm (CVE-2024-3104) | Advisory | 2024-06-06 |
| AVID-2026-R1461 | Remote Code Execution in create_conda_env function in parisneo/lollms (CVE-2024-3121) | Advisory | 2024-06-24 |
| AVID-2026-R1462 | GPT Academic: Pickle deserializing cookies may pose RCE risk (CVE-2024-31224) | Advisory | 2024-04-08 |
| AVID-2026-R1463 | Command Injection in parisneo/lollms-webui (CVE-2024-3126) | Advisory | 2024-05-16 |
| AVID-2026-R1464 | WordPress Copymatic plugin <= 1.6 - Unauthenticated Arbitrary File Upload vulnerability (CVE-2024-31351) | Advisory | 2024-05-17 |
| AVID-2026-R1465 | Privilege Escalation and Local File Inclusion in mintplex-labs/anything-llm (CVE-2024-3152) | Advisory | 2024-06-06 |
| AVID-2026-R1466 | Vulnerability CVE-2024-31580 | Advisory | 2024-04-17 |
| AVID-2026-R1467 | Vulnerability CVE-2024-31583 | Advisory | 2024-04-17 |
| AVID-2026-R1468 | Apache Zeppelin: Remote code execution by adding malicious JDBC connection string (CVE-2024-31864) | Advisory | 2024-04-09 |
| AVID-2026-R1469 | Kohya_ss is vulnerable to a command injection in basic_caption_gui.py (GHSL-2024-019) (CVE-2024-32022) | Advisory | 2024-04-16 |
| AVID-2026-R1470 | Kohya_ss vulnerable to path injection in `common_gui.py` `find_and_replace` function (`GHSL-2024-024`) (CVE-2024-32023) | Advisory | 2024-04-16 |
| AVID-2026-R1471 | Kohya_ss is vulnerable to a command injection in `group_images_gui.py` (`GHSL-2024-021`) (CVE-2024-32025) | Advisory | 2024-04-16 |
| AVID-2026-R1472 | Path Traversal in gaizhenbiao/chuanhuchatgpt (CVE-2024-3234) | Advisory | 2024-06-06 |
| AVID-2026-R1473 | Use of Uninitialized Variable Vulnerability in llama.cpp (CVE-2024-32878) | Advisory | 2024-04-26 |
| AVID-2026-R1474 | lobe-chat `/api/proxy` endpoint Server-Side Request Forgery vulnerability (CVE-2024-32964) | Advisory | 2024-05-10 |
| AVID-2026-R1475 | Buffer Over-read in Neural Processing Unit (CVE-2024-33037) | Advisory | 2024-12-02 |
| AVID-2026-R1476 | Path Traversal in parisneo/lollms-webui (CVE-2024-3322) | Advisory | 2024-06-06 |
| AVID-2026-R1477 | Vulnerability CVE-2024-33664 | Advisory | 2024-04-25 |
| AVID-2026-R1478 | Deserialization of Untrusted Data in sagemaker-python-sdk (CVE-2024-34072) | Advisory | 2024-05-03 |
| AVID-2026-R1479 | Command Injection in sagemaker-python-sdk (CVE-2024-34073) | Advisory | 2024-05-03 |
| AVID-2026-R1480 | Vulnerability CVE-2024-34165 | Advisory | 2024-11-13 |
| AVID-2026-R1481 | @cyclonedx/cyclonedx-library Improper Restriction of XML External Entity Reference vulnerability (CVE-2024-34345) | Advisory | 2024-05-09 |
| AVID-2026-R1482 | WordPress AI Engine plugin <= 2.2.63 - Auth. Arbitrary File Upload vulnerability (CVE-2024-34440) | Advisory | 2024-05-13 |
| AVID-2026-R1483 | Vulnerability CVE-2024-34997 | Advisory | 2024-05-17 |
| AVID-2026-R1484 | Jupyter server on Windows discloses Windows user password hash (CVE-2024-35178) | Advisory | 2024-06-06 |
| AVID-2026-R1485 | TorchServe bypass allowed_urls configuration (CVE-2024-35198) | Advisory | 2024-07-18 |
| AVID-2026-R1486 | TorchServe gRPC Port Exposure (CVE-2024-35199) | Advisory | 2024-07-18 |
| AVID-2026-R1487 | Arbitrary Code Execution via Deserialization in huggingface/transformers (CVE-2024-3568) | Advisory | 2024-04-10 |
| AVID-2026-R1488 | Path Traversal in qdrant/qdrant (CVE-2024-3584) | Advisory | 2024-05-30 |
| AVID-2026-R1489 | Apache Submarine Server Core: authorization bypass (CVE-2024-36265) | Advisory | 2024-06-12 |
| AVID-2026-R1490 | Vulnerability CVE-2024-36328 | Advisory | 2025-04-02 |
| AVID-2026-R1491 | Vulnerability CVE-2024-36336 | Advisory | 2025-04-02 |
| AVID-2026-R1492 | Vulnerability CVE-2024-36732 | Advisory | 2024-06-06 |
| AVID-2026-R1493 | Vulnerability CVE-2024-36736 | Advisory | 2024-06-06 |
| AVID-2026-R1494 | Vulnerability CVE-2024-36740 | Advisory | 2024-06-06 |
| AVID-2026-R1495 | Vulnerability CVE-2024-37014 | Advisory | 2024-06-10 |
| AVID-2026-R1496 | Vulnerability CVE-2024-37061 | Advisory | 2024-06-04 |
| AVID-2026-R1497 | Vulnerability CVE-2024-37062 | Advisory | 2024-06-04 |
| AVID-2026-R1498 | Vulnerability CVE-2024-37288 | Advisory | 2024-09-09 |
| AVID-2026-R1499 | WordPress AI Power: Complete AI Pack – Powered by GPT-4 plugin <= 1.8.66 - Cross Site Scripting (XSS) vulnerability (CVE-2024-37465) | Advisory | 2024-07-21 |
| AVID-2026-R1500 | Path thraversal in DeepJavaLibrary (CVE-2024-37902) | Advisory | 2024-06-17 |
| AVID-2026-R1501 | Vulnerability CVE-2024-38302 | Advisory | 2024-07-18 |
| AVID-2026-R1502 | Improper Restriction of XML External Entity Reference in org.cyclonedx:cyclonedx-core-java (CVE-2024-38374) | Advisory | 2024-06-28 |
| AVID-2026-R1503 | QNAP AI Core (CVE-2024-38647) | Advisory | 2024-11-22 |
| AVID-2026-R1504 | WordPress AI ENGINE plugin <= 2.4.7 - Server Side Request Forgery (SSRF) vulnerability (CVE-2024-38791) | Advisory | 2024-08-01 |
| AVID-2026-R1505 | fishaudio/Bert-VITS2 Command Injection in webui_preprocess.py bert_gen function (CVE-2024-39686) | Advisory | 2024-07-22 |
| AVID-2026-R1506 | fishaudio/Bert-VITS2 Limited File Write in webui_preprocess.py generate_config function (CVE-2024-39688) | Advisory | 2024-07-22 |
| AVID-2026-R1507 | Remote Code Execution (RCE) vulnerability in jupyterlab extension template `update-integration-tests` GitHub Action (CVE-2024-39700) | Advisory | 2024-07-16 |
| AVID-2026-R1508 | Vulnerability CVE-2024-39705 | Advisory | 2024-06-27 |
| AVID-2026-R1509 | Apache Airflow: DAG Author Code Execution possibility in airflow-scheduler (CVE-2024-39877) | Advisory | 2024-07-17 |
| AVID-2026-R1510 | Vulnerability CVE-2024-40441 | Advisory | 2024-09-23 |
| AVID-2026-R1511 | Vulnerability CVE-2024-40442 | Advisory | 2024-09-23 |
| AVID-2026-R1512 | Remote code execution in streamlit geospatial in pages/1_📷_Timelapse.py MODIS Ocean Color SMI option palette (CVE-2024-41115) | Advisory | 2024-07-26 |
| AVID-2026-R1513 | Remote code execution in streamlit geospatial in pages/10_🌍_Earth_Engine_Datasets.py (CVE-2024-41117) | Advisory | 2024-07-26 |
| AVID-2026-R1514 | streamlit-geospatial remote code execution in pages/8_🏜️_Raster_Data_Visualization.py (CVE-2024-41119) | Advisory | 2024-07-26 |
| AVID-2026-R1515 | llama.cpp null pointer dereference in gguf_init_from_file (CVE-2024-41130) | Advisory | 2024-07-22 |
| AVID-2026-R1516 | Insecure Jinja2 templates rendered in Haystack Components can lead to RCE (CVE-2024-41950) | Advisory | 2024-07-31 |
| AVID-2026-R1517 | open-telemetry has an Observable Timing Discrepancy (CVE-2024-42368) | Advisory | 2024-08-13 |
| AVID-2026-R1518 | Streamlit Path Traversal Security Vulnerability on Windows (CVE-2024-42474) | Advisory | 2024-08-12 |
| AVID-2026-R1519 | llama.cpp global-buffer-overflow in ggml_type_size (CVE-2024-42477) | Advisory | 2024-08-12 |
| AVID-2026-R1520 | llama.cpp allows Arbitrary Address Read in rpc_server::get_tensor (CVE-2024-42478) | Advisory | 2024-08-12 |
| AVID-2026-R1521 | llama.cpp allows write-what-where in rpc_server::set_tensor (CVE-2024-42479) | Advisory | 2024-08-12 |
| AVID-2026-R1522 | Secrets Exfiltration in gradio-app/gradio (CVE-2024-4254) | Advisory | 2024-06-04 |
| AVID-2026-R1523 | Remote Code Execution in berriai/litellm (CVE-2024-4264) | Advisory | 2024-05-18 |
| AVID-2026-R1524 | Vulnerability CVE-2024-42835 | Advisory | 2024-10-31 |
| AVID-2026-R1525 | Lack of login attempt rate-limiting in zenml-io/zenml (CVE-2024-4311) | Advisory | 2024-11-14 |
| AVID-2026-R1526 | Remote Code Execution due to LFI in '/install_extension' in parisneo/lollms-webui (CVE-2024-4320) | Advisory | 2024-06-06 |
| AVID-2026-R1527 | Server-Side Request Forgery (SSRF) in gradio-app/gradio (CVE-2024-4325) | Advisory | 2024-06-06 |
| AVID-2026-R1528 | Remote Code Execution via `/apply_settings` and `/execute_code` in parisneo/lollms-webui (CVE-2024-4326) | Advisory | 2024-05-16 |
| AVID-2026-R1529 | DeepSpeed Remote Code Execution Vulnerability (CVE-2024-43497) | Advisory | 2024-10-08 |
| AVID-2026-R1530 | CSRF in restart_program in parisneo/lollms-webui (CVE-2024-4403) | Advisory | 2024-06-10 |
| AVID-2026-R1531 | Apache Airflow: Authenticated DAG authors could execute code on scheduler nodes (CVE-2024-45034) | Advisory | 2024-09-07 |
| AVID-2026-R1532 | Vulnerability CVE-2024-45201 | Advisory | 2024-08-22 |
| AVID-2026-R1533 | Vulnerability CVE-2024-45758 | Advisory | 2024-09-06 |
| AVID-2026-R1534 | Vulnerability CVE-2024-45846 | Advisory | 2024-09-12 |
| AVID-2026-R1535 | Vulnerability CVE-2024-45851 | Advisory | 2024-09-12 |
| AVID-2026-R1536 | Vulnerability CVE-2024-45857 | Advisory | 2024-09-12 |
| AVID-2026-R1537 | Computer Vision Annotation Tool (CVAT) contains a stored XSS via the quality report data endpoint (CVE-2024-47063) | Advisory | 2024-09-30 |
| AVID-2026-R1538 | CORS origin validation is not performed when the request has a cookie in Gradio (CVE-2024-47084) | Advisory | 2024-10-10 |
| AVID-2026-R1539 | The `is_in_or_equal` function may be bypassed in Gradio (CVE-2024-47164) | Advisory | 2024-10-10 |
| AVID-2026-R1540 | One-level read path traversal in `/custom_component` in Gradio (CVE-2024-47166) | Advisory | 2024-10-10 |
| AVID-2026-R1541 | SSRF in the path parameter of /queue/join in Gradio (CVE-2024-47167) | Advisory | 2024-10-10 |
| AVID-2026-R1542 | The `enable_monitoring` flag set to `False` does not disable monitoring in Gradio (CVE-2024-47168) | Advisory | 2024-10-10 |
| AVID-2026-R1543 | Agnai vulnerable to Remote Code Execution via JS Upload using Directory Traversal (CVE-2024-47169) | Advisory | 2024-09-26 |
| AVID-2026-R1544 | Computer Vision Annotation Tool (CVAT) access control is broken in several PATCH endpoints (CVE-2024-47172) | Advisory | 2024-09-30 |
| AVID-2026-R1545 | Vulnerability CVE-2024-47481 | Advisory | 2024-10-25 |
| AVID-2026-R1546 | Vulnerability CVE-2024-47483 | Advisory | 2024-10-25 |
| AVID-2026-R1547 | Lack of integrity check on the downloaded FRP client in Gradio (CVE-2024-47867) | Advisory | 2024-10-10 |
| AVID-2026-R1548 | Insecure communication between the FRP client and server in Gradio (CVE-2024-47871) | Advisory | 2024-10-10 |
| AVID-2026-R1549 | Vulnerability CVE-2024-48052 | Advisory | 2024-11-04 |
| AVID-2026-R1550 | Vulnerability CVE-2024-48057 | Advisory | 2024-11-04 |
| AVID-2026-R1551 | Vulnerability CVE-2024-48063 | Advisory | 2024-10-29 |
| AVID-2026-R1552 | TorchGeo Remote Code Execution Vulnerability (CVE-2024-49048) | Advisory | 2024-11-12 |
| AVID-2026-R1553 | Vulnerability CVE-2024-49194 | Advisory | 2024-12-17 |
| AVID-2026-R1554 | IBM Watson Studio Local cross-site request forgery (CVE-2024-49340) | Advisory | 2024-10-15 |
| AVID-2026-R1555 | IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data denial of service (CVE-2024-49353) | Advisory | 2024-11-26 |
| AVID-2026-R1556 | XSS and Open Redirect via SVG File Upload in parisneo/lollms-webui (CVE-2024-5125) | Advisory | 2024-11-14 |
| AVID-2026-R1557 | Path Traversal in mudler/localai (CVE-2024-5182) | Advisory | 2024-06-19 |
| AVID-2026-R1558 | Arbitrary File Overwrite in download_model_with_test_data in onnx/onnx (CVE-2024-5187) | Advisory | 2024-06-06 |
| AVID-2026-R1559 | ReDoS in Giskard Scan text perturbation (CVE-2024-52524) | Advisory | 2024-11-14 |
| AVID-2026-R1560 | LLama Factory Remote OS Command Injection Vulnerability (CVE-2024-52803) | Advisory | 2024-11-21 |
| AVID-2026-R1561 | Issuer field partial matches allowed in pyjwt (CVE-2024-53861) | Advisory | 2024-11-29 |
| AVID-2026-R1562 | Vulnerability CVE-2024-53870 | Advisory | 2025-02-25 |
| AVID-2026-R1563 | Vulnerability CVE-2024-53872 | Advisory | 2025-02-25 |
| AVID-2026-R1564 | Vulnerability CVE-2024-53873 | Advisory | 2025-02-25 |
| AVID-2026-R1565 | Vulnerability CVE-2024-53874 | Advisory | 2025-02-25 |
| AVID-2026-R1566 | Vulnerability CVE-2024-53875 | Advisory | 2025-02-25 |
| AVID-2026-R1567 | Vulnerability CVE-2024-53876 | Advisory | 2025-02-25 |
| AVID-2026-R1568 | Vulnerability CVE-2024-53877 | Advisory | 2025-02-25 |
| AVID-2026-R1569 | Vulnerability CVE-2024-53878 | Advisory | 2025-02-25 |
| AVID-2026-R1570 | Vulnerability CVE-2024-53879 | Advisory | 2025-02-25 |
| AVID-2026-R1571 | Vulnerability CVE-2024-53880 | Advisory | 2025-02-12 |
| AVID-2026-R1572 | WordPress AIKCT Engine Chatbot, ChatGPT, Gemini, GPT-4o Best AI Chatbot plugin <= 1.6.2 - Cross Site Request Forgery (CSRF) vulnerability (CVE-2024-54306) | Advisory | 2024-12-13 |
| AVID-2026-R1573 | RCE via Property/Class Pollution in lightning-ai/pytorch-lightning (CVE-2024-5452) | Advisory | 2024-06-06 |
| AVID-2026-R1574 | Vulnerability CVE-2024-55459 | Advisory | 2025-01-08 |
| AVID-2026-R1575 | RedisBloom Integer Overflow Remote Code Execution Vulnerability (CVE-2024-55656) | Advisory | 2025-01-08 |
| AVID-2026-R1576 | D-Tale allows Remote Code Execution through the Custom Filter Input (CVE-2024-55890) | Advisory | 2024-12-13 |
| AVID-2026-R1577 | MaxKB RCE vulnerability in function library (CVE-2024-56137) | Advisory | 2025-01-02 |
| AVID-2026-R1578 | Firecrawl has SSRF Vulnerability via malicious scrape target (CVE-2024-56800) | Advisory | 2024-12-30 |
| AVID-2026-R1579 | Remote Code Execution in BerriAI/litellm (CVE-2024-5751) | Advisory | 2024-06-27 |
| AVID-2026-R1580 | Unprotected WebSocket in stitionai/devika (CVE-2024-5820) | Advisory | 2024-06-27 |
| AVID-2026-R1581 | Denial of Service via Invalid Argument in h2oai/h2o-3 (CVE-2024-5979) | Advisory | 2024-06-27 |
| AVID-2026-R1582 | Arbitrary File Write via /v1/runs API endpoint in lightning-ai/pytorch-lightning (CVE-2024-5980) | Advisory | 2024-06-27 |
| AVID-2026-R1583 | Missing client_id in parisneo/lollms-webui (CVE-2024-6040) | Advisory | 2024-08-01 |
| AVID-2026-R1584 | SSRF and Partial LFI in /models/apply Endpoint in mudler/localai (CVE-2024-6095) | Advisory | 2024-07-06 |
| AVID-2026-R1585 | Remote Code Execution in pypa/setuptools (CVE-2024-6345) | Advisory | 2024-07-15 |
| AVID-2026-R1586 | Arbitrary File Overwrite and Data Exfiltration in aimhubio/aim (CVE-2024-6396) | Advisory | 2024-07-12 |
| AVID-2026-R1587 | Arbitrary File/Directory Deletion in aimhubio/aim (CVE-2024-6483) | Advisory | 2025-03-20 |
| AVID-2026-R1588 | Unclaimed S3 Bucket Usage in pytorch/serve (CVE-2024-6577) | Advisory | 2025-03-20 |
| AVID-2026-R1589 | Path Traversal in stangirard/quivr (CVE-2024-6583) | Advisory | 2025-03-20 |
| AVID-2026-R1590 | Remote Code Execution in BerriAI/litellm (CVE-2024-6825) | Advisory | 2025-03-20 |
| AVID-2026-R1591 | Arbitrary File Overwrite through tarfile-extraction in aimhubio/aim (CVE-2024-6829) | Advisory | 2025-03-20 |
| AVID-2026-R1592 | SmartSearchWP < 2.4.6 - Unauthenticated OpenAI Key Disclosure (CVE-2024-6845) | Advisory | 2024-09-25 |
| AVID-2026-R1593 | Arbitrary File Overwrite in h2oai/h2o-3 (CVE-2024-6854) | Advisory | 2025-03-20 |
| AVID-2026-R1594 | Arbitrary File Write in mudler/LocalAI (CVE-2024-6868) | Advisory | 2024-10-29 |
| AVID-2026-R1595 | JFrog Artifactory Cache Poisoning (CVE-2024-6915) | Advisory | 2024-08-05 |
| AVID-2026-R1596 | Remote Code Execution in Calculate Function in parisneo/lollms (CVE-2024-6982) | Advisory | 2025-03-20 |
| AVID-2026-R1597 | Remote Code Execution in mudler/localai (CVE-2024-6983) | Advisory | 2024-09-27 |
| AVID-2026-R1598 | Remote Code Execution due to Arbitrary File Write in open-webui/open-webui (CVE-2024-7034) | Advisory | 2025-03-20 |
| AVID-2026-R1599 | Improper Neutralization of Special Elements used in a Command ('Command Injection') in GitLab (CVE-2024-7110) | Advisory | 2024-08-22 |
| AVID-2026-R1600 | AI Chatbot with ChatGPT by AYS <= 2.0.9 - Unauthenticated OpenAI Key Disclosure (CVE-2024-7713) | Advisory | 2024-09-27 |
| AVID-2026-R1601 | AI Assistant with ChatGPT by AYS <= 2.0.9 - Unauthenticated AJAX Calls (CVE-2024-7714) | Advisory | 2024-09-27 |
| AVID-2026-R1602 | CSRF in aimhubio/aim (CVE-2024-7760) | Advisory | 2025-03-20 |
| AVID-2026-R1603 | Denial of Service in h2oai/h2o-3 (CVE-2024-7765) | Advisory | 2025-03-20 |
| AVID-2026-R1604 | Denial of Service in h2oai/h2o-3 (CVE-2024-7768) | Advisory | 2025-03-20 |
| AVID-2026-R1605 | Arbitrary File Overwrite in onnx/onnx (CVE-2024-7776) | Advisory | 2025-03-20 |
| AVID-2026-R1606 | Arbitrary File Overwrite in danswer-ai/danswer (CVE-2024-7957) | Advisory | 2025-03-20 |
| AVID-2026-R1607 | Arbitrary File Write/Overwrite in lightning-ai/pytorch-lightning (CVE-2024-8019) | Advisory | 2025-03-20 |
| AVID-2026-R1608 | Open Redirect in gradio-app/gradio (CVE-2024-8021) | Advisory | 2025-03-20 |
| AVID-2026-R1609 | Denial of Service in aimhubio/aim (CVE-2024-8061) | Advisory | 2025-03-20 |
| AVID-2026-R1610 | Denial of Service in h2oai/h2o-3 (CVE-2024-8062) | Advisory | 2025-03-20 |
| AVID-2026-R1611 | Divide by Zero in ollama/ollama (CVE-2024-8063) | Advisory | 2025-03-20 |
| AVID-2026-R1612 | CSRF in danswer-ai/danswer (CVE-2024-8065) | Advisory | 2025-03-20 |
| AVID-2026-R1613 | CORS Misconfiguration in prefecthq/prefect (CVE-2024-8183) | Advisory | 2025-03-20 |
| AVID-2026-R1614 | Unrestricted Code Execution in aimhubio/aim (CVE-2024-8238) | Advisory | 2025-03-20 |
| AVID-2026-R1615 | Path Traversal in mintplex-labs/anything-llm (CVE-2024-8248) | Advisory | 2025-03-20 |
| AVID-2026-R1616 | Improper Protection of Alternate Path in GitLab (CVE-2024-8311) | Advisory | 2024-09-12 |
| AVID-2026-R1617 | Object deserialization in Reverb leading to RCE (CVE-2024-8375) | Advisory | 2024-09-19 |
| AVID-2026-R1618 | Path Traversal in modelscope/agentscope (CVE-2024-8438) | Advisory | 2025-03-20 |
| AVID-2026-R1619 | CORS Vulnerability in modelscope/agentscope (CVE-2024-8487) | Advisory | 2025-03-20 |
| AVID-2026-R1620 | Remote Code Execution via Deserialization in modelscope/agentscope (CVE-2024-8502) | Advisory | 2025-03-20 |
| AVID-2026-R1621 | Local File Inclusion (LFI) in modelscope/agentscope (CVE-2024-8550) | Advisory | 2025-02-10 |
| AVID-2026-R1622 | Path Traversal in modelscope/agentscope (CVE-2024-8551) | Advisory | 2025-03-20 |
| AVID-2026-R1623 | Arbitrary File Overwrite in h2oai/h2o-3 (CVE-2024-8616) | Advisory | 2025-03-20 |
| AVID-2026-R1624 | Arbitrary File Deletion via Relative Path Traversal in aimhubio/aim (CVE-2024-8769) | Advisory | 2025-03-20 |
| AVID-2026-R1625 | Ansible-core: exposure of sensitive information in ansible vault files due to improper logging (CVE-2024-8775) | Advisory | 2024-09-14 |
| AVID-2026-R1626 | Path Traversal in mlflow/mlflow (CVE-2024-8859) | Advisory | 2025-03-20 |
| AVID-2026-R1627 | h2oai h2o-3 JDBC Connection 1 getConnectionSafe deserialization (CVE-2024-8862) | Advisory | 2024-09-14 |
| AVID-2026-R1628 | Path Traversal in parisneo/lollms-webui (CVE-2024-8898) | Advisory | 2025-03-20 |
| AVID-2026-R1629 | Local File Inclusion in bentoml/openllm (CVE-2024-8982) | Advisory | 2025-03-20 |
| AVID-2026-R1630 | Denial of Service in bentoml/bentoml (CVE-2024-9056) | Advisory | 2025-03-20 |
| AVID-2026-R1631 | Privilege Escalation in lunary-ai/lunary (CVE-2024-9098) | Advisory | 2025-03-20 |
| AVID-2026-R1632 | Denial of Service (DoS) via Multipart Boundary in zenml-io/zenml (CVE-2024-9340) | Advisory | 2025-03-20 |
| AVID-2026-R1633 | Directory Traversal in polyaxon/polyaxon (CVE-2024-9362) | Advisory | 2025-03-20 |
| AVID-2026-R1634 | Cross-Site Request Forgery (CSRF) in polyaxon/polyaxon (CVE-2024-9365) | Advisory | 2025-03-20 |
| AVID-2026-R1635 | Improper Privilege Management in transformeroptimus/superagi (CVE-2024-9431) | Advisory | 2025-03-20 |
| AVID-2026-R1636 | Remote Code Execution in transformeroptimus/superagi (CVE-2024-9439) | Advisory | 2025-03-20 |
| AVID-2026-R1637 | Stored XSS in Kubeflow Pipeline View (CVE-2024-9526) | Advisory | 2024-11-18 |
| AVID-2026-R1638 | Remote Code Execution in kedro-org/kedro (CVE-2024-9701) | Advisory | 2025-03-20 |
| AVID-2026-R1639 | Missing Authentication Check in parisneo/lollms-webui (CVE-2024-9919) | Advisory | 2025-03-20 |
| AVID-2026-R1640 | Unrestricted File Upload and Execution in parisneo/lollms-webui (CVE-2024-9920) | Advisory | 2025-03-20 |
| AVID-2026-R1641 | Denial of Service (DoS) by Sending Large Filename at File Upload Endpoint in gradio-app/gradio (CVE-2025-0187) | Advisory | 2025-03-20 |
| AVID-2026-R1642 | SSRF in gaizhenbiao/chuanhuchatgpt (CVE-2025-0188) | Advisory | 2025-03-20 |
| AVID-2026-R1643 | Stored Cross-site Scripting (XSS) in wandb/openui (CVE-2025-0192) | Advisory | 2025-03-20 |
| AVID-2026-R1644 | Exposure of Sensitive Information in berriai/litellm (CVE-2025-0330) | Advisory | 2025-03-20 |
| AVID-2026-R1645 | SSRF Check Bypass in Requests Utility in significant-gravitas/autogpt (CVE-2025-0454) | Advisory | 2025-03-20 |
| AVID-2026-R1646 | MD5 Hash Collision in SageMaker Workflow in aws/sagemaker-python-sdk (CVE-2025-0508) | Advisory | 2025-03-20 |
| AVID-2026-R1647 | Stack Exhaustion In Tensorflow Serving (CVE-2025-0649) | Advisory | 2025-05-06 |
| AVID-2026-R1648 | Improper Access Control vulnerability in EmbedAI (CVE-2025-0744) | Advisory | 2025-01-30 |
| AVID-2026-R1649 | Path traversal issue in Deep Java Library (CVE-2025-0851) | Advisory | 2025-01-29 |
| AVID-2026-R1650 | Orthanc Server Missing Authentication for Critical Function (CVE-2025-0896) | Advisory | 2025-02-13 |
| AVID-2026-R1651 | Regular Expression Denial of Service (ReDoS) in huggingface/transformers (CVE-2025-1194) | Advisory | 2025-04-29 |
| AVID-2026-R1652 | Weak Password Requirements in mlflow/mlflow (CVE-2025-1474) | Advisory | 2025-03-20 |
| AVID-2026-R1653 | vLLM AIBrix Prefix Caching hash.go random values (CVE-2025-1953) | Advisory | 2025-03-04 |
| AVID-2026-R1654 | Vulnerability CVE-2025-1979 | Advisory | 2025-03-06 |
| AVID-2026-R1655 | Regular Expression Denial of Service (ReDoS) in huggingface/transformers (CVE-2025-2099) | Advisory | 2025-05-19 |
| AVID-2026-R1656 | PyTorch Tuple torch.ops.profiler._call_end_callbacks_on_jit_fut memory corruption (CVE-2025-2148) | Advisory | 2025-03-10 |
| AVID-2026-R1657 | AutoGPT SSRF vulnerability (CVE-2025-22603) | Advisory | 2025-03-10 |
| AVID-2026-R1658 | Vulnerability CVE-2025-22892 | Advisory | 2025-05-13 |
| AVID-2026-R1659 | Gradio Blocked Path ACL Bypass Vulnerability (CVE-2025-23042) | Advisory | 2025-01-14 |
| AVID-2026-R1660 | CVAT allows remote code execution via tracker Nuclio functions (CVE-2025-23045) | Advisory | 2025-01-28 |
| AVID-2026-R1661 | Vulnerability CVE-2025-23243 | Advisory | 2025-03-11 |
| AVID-2026-R1662 | Vulnerability CVE-2025-23247 | Advisory | 2025-05-27 |
| AVID-2026-R1663 | Vulnerability CVE-2025-23249 | Advisory | 2025-04-22 |
| AVID-2026-R1664 | Vulnerability CVE-2025-23250 | Advisory | 2025-04-22 |
| AVID-2026-R1665 | Vulnerability CVE-2025-23360 | Advisory | 2025-03-11 |
| AVID-2026-R1666 | WordPress Salvador – AI Image Generator plugin <= 1.0.11 - Broken Access Control vulnerability (CVE-2025-23954) | Advisory | 2025-01-16 |
| AVID-2026-R1667 | The Snowflake Connector for Python uses insecure cache files permissions (CVE-2025-24795) | Advisory | 2025-01-29 |
| AVID-2026-R1668 | Label Studio has a Path Traversal Vulnerability via image Field (CVE-2025-25295) | Advisory | 2025-02-14 |
| AVID-2026-R1669 | Rembg CORS misconfiguration (CVE-2025-25302) | Advisory | 2025-03-03 |
| AVID-2026-R1670 | Remote code execution when loading a crafted GraphQL schema (CVE-2025-27407) | Advisory | 2025-03-12 |
| AVID-2026-R1671 | Snowflake JDBC Driver client-side encryption key in DEBUG logs (CVE-2025-27496) | Advisory | 2025-03-13 |
| AVID-2026-R1672 | Applio allows SSRF and file write in model_download.py (CVE-2025-27775) | Advisory | 2025-03-19 |
| AVID-2026-R1673 | Applio allows unsafe deserialization in model_information.py (CVE-2025-27780) | Advisory | 2025-03-19 |
| AVID-2026-R1674 | Applio allows unsafe deserialization in inference.py (CVE-2025-27781) | Advisory | 2025-03-19 |
| AVID-2026-R1675 | Applio allows arbitrary file write in inference.py (CVE-2025-27782) | Advisory | 2025-03-19 |
| AVID-2026-R1676 | Applio allows a DoS in restart.py (CVE-2025-27787) | Advisory | 2025-03-19 |
| AVID-2026-R1677 | Vulnerability CVE-2025-29189 | Advisory | 2025-04-09 |
| AVID-2026-R1678 | vLLM Allows Remote Code Execution via Mooncake Integration (CVE-2025-29783) | Advisory | 2025-03-19 |
| AVID-2026-R1679 | Apache Parquet Java: Arbitrary code execution in the parquet-avro module when reading an Avro schema from a Parquet file metadata (CVE-2025-30065) | Advisory | 2025-04-01 |
| AVID-2026-R1680 | Remote Code Execution Vulnerability in vLLM Multi-Node Cluster Configuration (CVE-2025-30165) | Advisory | 2025-05-06 |
| AVID-2026-R1681 | Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability (CVE-2025-30387) | Advisory | 2025-05-13 |
| AVID-2026-R1682 | Azure Bot Framework SDK Elevation of Privilege Vulnerability (CVE-2025-30389) | Advisory | 2025-04-30 |
| AVID-2026-R1683 | Azure ML Compute Elevation of Privilege Vulnerability (CVE-2025-30390) | Advisory | 2025-04-30 |
| AVID-2026-R1684 | Azure AI Bot Elevation of Privilege Vulnerability (CVE-2025-30392) | Advisory | 2025-04-30 |
| AVID-2026-R1685 | MindSpore mindspore.numpy.fft.hfftn memory corruption (CVE-2025-3144) | Advisory | 2025-04-03 |
| AVID-2026-R1686 | MindSpore mindspore.numpy.fft.rfft2 memory corruption (CVE-2025-3145) | Advisory | 2025-04-03 |
| AVID-2026-R1687 | AutoGPT allows SSRF due to DNS Rebinding in requests wrapper (CVE-2025-31490) | Advisory | 2025-04-14 |
| AVID-2026-R1688 | InternLM LMDeploy conf.py open code injection (CVE-2025-3163) | Advisory | 2025-04-03 |
| AVID-2026-R1689 | Denial of Service by abusing xgrammar unbounded cache in memory (CVE-2025-32381) | Advisory | 2025-04-09 |
| AVID-2026-R1690 | MaxKB has a reverse shell vulnerability in function library (CVE-2025-32383) | Advisory | 2025-04-10 |
| AVID-2026-R1691 | PyTorch: `torch.load` with `weights_only=True` leads to remote code execution (CVE-2025-32434) | Advisory | 2025-04-18 |
| AVID-2026-R1692 | vLLM Vulnerable to Remote Code Execution via Mooncake Integration (CVE-2025-32444) | Advisory | 2025-04-30 |
| AVID-2026-R1693 | labsai/eddi Vulnerable to Path Traversal (Zip Slip) in ZIP Import Function (CVE-2025-32779) | Advisory | 2025-04-15 |
| AVID-2026-R1694 | conda-forge-webservices has an Unauthorized Artifact Modification Race Condition (CVE-2025-32784) | Advisory | 2025-04-15 |
| AVID-2026-R1695 | PyTorch LossCTC.cpp torch.nn.functional.ctc_loss denial of service (CVE-2025-3730) | Advisory | 2025-04-16 |
| AVID-2026-R1696 | PyTorch nccl.py torch.cuda.nccl.reduce denial of service (CVE-2025-4287) | Advisory | 2025-05-05 |
| AVID-2026-R1697 | GHSL-2025-012_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43842) | Advisory | 2025-05-05 |
| AVID-2026-R1698 | GHSL-2025-013_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43843) | Advisory | 2025-05-05 |
| AVID-2026-R1699 | GHSL-2025-016_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43846) | Advisory | 2025-05-05 |
| AVID-2026-R1700 | GHSL-2025-017_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43847) | Advisory | 2025-05-05 |
| AVID-2026-R1701 | GHSL-2025-019_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43849) | Advisory | 2025-05-05 |
| AVID-2026-R1702 | GHSL-2025-020_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43850) | Advisory | 2025-05-05 |
| AVID-2026-R1703 | GHSL-2025-021_Retrieval-based-Voice-Conversion-WebUI (CVE-2025-43851) | Advisory | 2025-05-05 |
| AVID-2026-R1704 | Divide By Zero in dlib (CVE-2025-4637) | Advisory | 2025-05-14 |
| AVID-2026-R1705 | LLaMA-Factory Allows Arbitrary Code Execution via Unsafe Deserialization in Ilamafy_baichuan2.py (CVE-2025-46567) | Advisory | 2025-05-01 |
| AVID-2026-R1706 | OZI-Project/ozi-publish Code Injection vulnerability (CVE-2025-47271) | Advisory | 2025-05-12 |
| AVID-2026-R1707 | ToolHive stores secrets in the state store with no encryption (CVE-2025-47274) | Advisory | 2025-05-12 |
| AVID-2026-R1708 | vLLM Allows Remote Code Execution via PyNcclPipe Communication Service (CVE-2025-47277) | Advisory | 2025-05-20 |
| AVID-2026-R1709 | 5ire Client Vulnerable to Cross-Site Scripting (XSS) and Remote Code Execution (RCE) (CVE-2025-47777) | Advisory | 2025-05-14 |
| AVID-2026-R1710 | vLLM has a Regular Expression Denial of Service (ReDoS, Exponential Complexity) Vulnerability in `pythonic_tool_parser.py` (CVE-2025-48887) | Advisory | 2025-05-30 |
| AVID-2026-R1711 | Gradio Allows Unauthorized File Copy via Path Manipulation (CVE-2025-48889) | Advisory | 2025-05-30 |
| AVID-2026-R1712 | erdogant pypickle pypickle.py load deserialization (CVE-2025-5174) | Advisory | 2025-05-26 |
| AVID-2026-R1713 | erdogant pypickle pypickle.py save improper authorization (CVE-2025-5175) | Advisory | 2025-05-26 |
| AVID-2026-R1714 | Trivy ecosystem supply chain briefly compromised (CVE-2026-33634) | Advisory | 2026-03-23 |