Lucene search

K
ApplioApplio

4 matches found

CVE
CVE
added 2025/03/19 9:15 p.m.542 views

CVE-2025-27777

Applio is a voice conversion tool. Versions 3.2.7 and prior are vulnerable to server-side request forgery (SSRF) in model_download.py (line 195 in 3.2.7). The blind SSRF allows for sending requests on behalf of Applio server and can be leveraged to probe for other vulnerabilities on the server itse...

8.7CVSS6.6AI score0.00066EPSS
CVE
CVE
added 2025/03/19 9:15 p.m.526 views

CVE-2025-27784

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's export_pth function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with blind server-side request forgery to read files fr...

8.7CVSS6.3AI score0.00066EPSS
CVE
CVE
added 2025/03/19 9:15 p.m.62 views

CVE-2025-27787

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to denial of service (DoS) in restart.py. model_name in train.py takes user input, and passes it to the stop_train function in restart.py, which uses it construct a path to a folder with config.json. That config.json ...

8.8CVSS6.7AI score0.00256EPSS
CVE
CVE
added 2025/03/19 9:15 p.m.46 views

CVE-2025-27785

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's export_index function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with blind server-side request forgery to read files ...

8.7CVSS6.6AI score0.00106EPSS