Security Advisory

HiddenLayer’s Synaptic Adversarial Intelligence (SAI) team consists of multidisciplinary cybersecurity experts and data scientists dedicated to raising awareness about threats to machine learning and artificial intelligence systems. Our mission is to educate data scientists, MLDevOps teams, and cybersecurity practitioners on evaluating ML/AI vulnerabilities and risks, promoting more security-conscious implementations and deployments.

During our research, we identify numerous vulnerabilities within ML/AI projects. While our research blogs cover those that we consider to be most impactful, some affect only specific projects or use cases. We’ve therefore created this dedicated space to share all of our findings, enabling users within our community to keep updated on new vulnerabilities, including security issues that have not been assigned a CVE.

December 2024

October 2024

  • NVIDIA NeMo

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More

September 2024

August 2024

July 2024

  • Wyze Cam V4

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • Tensorflow Probability

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More

June 2024

  • Skops

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • YData-profiling

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • MLflow

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • MLflow

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • MLflow

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • MLflow

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • MLflow

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • MLflow

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • MLflow

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • MLflow

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • MLflow

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • MLflow

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • YData-profiling

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • YData-profiling

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More

April 2024

  • AWS Sagemaker

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • AWS Sagemaker

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • R

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More

February 2024

  • ONNX

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • ONNX

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • ClearML

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • ClearML

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • ClearML

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • ClearML

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • ClearML

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More
  • ClearML

    Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An arbitrary code execution vulnerability exists inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file in the Weaviate integration. The vulnerability requires the attacker to be authorized on the MindsDB...

    Read More