{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T16:37:30.320","vulnerabilities":[{"cve":{"id":"CVE-2024-12074","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:27.220","lastModified":"2025-08-05T16:21:38.570","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A Denial of Service (DoS) vulnerability was discovered in the file upload feature of automatic1111/stable-diffusion-webui version 1.10.0. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. By sending a payload with an excessively large filename, the server becomes overwhelmed and unresponsive, leading to unavailability for legitimate users. This issue can be exploited without authentication, making it highly scalable and increasing the risk of exploitation."},{"lang":"es","value":"Se descubrió una vulnerabilidad de denegación de servicio (DoS) en la función de carga de archivos de automatic1111/stable-diffusion-webui versión 1.10.0. La vulnerabilidad se debe a una gestión inadecuada de datos de formulario con un nombre de archivo demasiado grande en la solicitud de carga de archivos. Al enviar un payload con un nombre de archivo excesivamente grande, el servidor se satura y deja de responder, lo que provoca la indisponibilidad para usuarios legítimos. Este problema puede explotarse sin autenticación, lo que lo hace altamente escalable y aumenta el riesgo de explotación."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:automatic1111:stable-diffusion-webui:1.10.0:*:*:*:*:*:*:*","matchCriteriaId":"2770C0D5-C2C6-4775-BA35-5E50ED159DD1"}]}]}],"references":[{"url":"https://huntr.com/bounties/6b44bfc2-31a7-4fe9-86fb-072c90a23642","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}