Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| gradio-app | gradio | < 5.0.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-47166 | One-level read path traversal in `/custom_component` in Gradio | |
| CVE-2024-47872 | Cross-site Scripting on Gradio server via upload of HTML files, JS files, or SVG files | |
| CVE-2024-47165 | CORS origin validation accepts the null origin in Gradio | |
| CVE-2024-47167 | SSRF in the path parameter of /queue/join in Gradio | |
| CVE-2024-47867 | Lack of integrity check on the downloaded FRP client in Gradio | |
| CVE-2024-47168 | The `enable_monitoring` flag set to `False` does not disable monitoring in Gradio | |
| CVE-2024-47084 | CORS origin validation is not performed when the request has a cookie in Gradio | |
| CVE-2024-47870 | Race condition in update_root_in_config may redirect user traffic in Gradio | |
| CVE-2024-47164 | The `is_in_or_equal` function may be bypassed in Gradio | |
| CVE-2024-47869 | Non-constant-time comparison when comparing hashes in Gradio | |
| CVE-2024-47868 | Several components’ post-process steps may allow arbitrary file leaks in Gradio |
No comments yet