{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T03:45:07.464","vulnerabilities":[{"cve":{"id":"CVE-2024-10648","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:18.010","lastModified":"2025-10-14T18:52:29.127","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A path traversal vulnerability exists in the Gradio Audio component of gradio-app/gradio, as of version git 98cbcae. This vulnerability allows an attacker to control the format of the audio file, leading to arbitrary file content deletion. By manipulating the output format, an attacker can reset any file to an empty file, causing a denial of service (DOS) on the server."},{"lang":"es","value":"Existe una vulnerabilidad de path traversal en el componente Gradio Audio de gradio-app/gradio, a partir de la versión git 98cbcae. Esta vulnerabilidad permite a un atacante controlar el formato del archivo de audio, lo que provoca la eliminación arbitraria de contenido. Al manipular el formato de salida, un atacante puede restablecer cualquier archivo a un archivo vacío, provocando una denegación de servicio (DOS) en el servidor."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.2}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-29"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gradio_project:gradio:2024-09-18:*:*:*:*:python:*:*","matchCriteriaId":"8926A90F-6CE8-4BEB-A0E5-34CFE8F1DD55"}]}]}],"references":[{"url":"https://huntr.com/bounties/667d664d-8189-458c-8ed7-483fe8f33c76","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}