| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2023-51449 | Make the `/file` secure against file traversal attacks | gradio-app | gradio | Medium | 5.6 | 2023-12-22 20:58:36 | Deep Dive |
| CVE-2023-6572 | Command Injection in gradio-app/gradio | gradio-app | gradio-app/gradio | - | - | 2023-12-14 13:14:17 | Deep Dive |
| CVE-2023-34239 | Unfiltered paths in gradio | gradio-app | gradio | High | 7.3 | 2023-06-07 23:20:07 | Deep Dive |
| CVE-2023-25823 | Gradio contains Use of Hard-coded Credentials | gradio-app | gradio | Medium | 5.4 | 2023-02-23 21:34:33 | Deep Dive |
| CVE-2022-24770 | Improper Neutralization of Formula Elements in a CSV File in Gradio Flagging | gradio-app | gradio | High | 8.8 | 2022-03-17 20:30:19 | Deep Dive |
| CVE-2021-43831 | Files on the host computer can be accessed from the Gradio interface | gradio-app | gradio | High | 7.7 | 2021-12-15 19:50:10 | Deep Dive |