Lucene search

K

4 matches found

CVE
CVE
added 2024/03/27 4:15 p.m.82 views

CVE-2024-1540

A command injection vulnerability exists in the deploy+test-visual.yml workflow of the gradio-app/gradio repository, due to improper neutralization of special elements used in a command. This vulnerability allows attackers to execute unauthorized commands, potentially leading to unauthorized modifi...

8.6CVSS8.8AI score0.00296EPSS
CVE
CVE
added 2024/03/29 5:15 a.m.77 views

CVE-2024-1729

A timing attack vulnerability exists in the gradio-app/gradio repository, specifically within the login function in routes.py. The vulnerability arises from the use of a direct comparison operation (app.auth[username] == password) to validate user credentials, which can be exploited to guess passwo...

5.9CVSS5.7AI score0.0006EPSS
CVE
CVE
added 2024/03/21 8:15 p.m.73 views

CVE-2024-1727

A Cross-Site Request Forgery (CSRF) vulnerability in gradio-app/gradio allows attackers to upload multiple large files to a victim's system if they are running Gradio locally. By crafting a malicious HTML page that triggers an unauthorized file upload to the victim's server, an attacker can deplete...

4.3CVSS4.5AI score0.00115EPSS
CVE
CVE
added 2024/03/27 1:15 a.m.54 views

CVE-2024-2206

An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the /proxy route. Attackers can exploit this vulnerability by manipulating the self.replica_urls set through the X-Direct-Url header in requests to the / and /config routes, allowing the ad...

7.3CVSS7AI score0.00096EPSS