Applio

Applio

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 19.03.2025 20:42:56
  • Zuletzt bearbeitet 01.08.2025 00:55:35

Applio is a voice conversion tool. Versions 3.2.7 and prior are vulnerable to server-side request forgery (SSRF) and file write in `model_download.py` (line 156 in 3.2.7). The blind SSRF allows for sending requests on behalf of Applio server and can ...

  • EPSS 0.18%
  • Veröffentlicht 19.03.2025 20:42:47
  • Zuletzt bearbeitet 01.08.2025 00:50:07

Applio is a voice conversion tool. Versions 3.2.7 and prior are vulnerable to server-side request forgery (SSRF) and file write in `model_download.py` (line 143 in 3.2.7). The blind SSRF allows for sending requests on behalf of Applio server and can ...

  • EPSS 0.17%
  • Veröffentlicht 19.03.2025 20:42:38
  • Zuletzt bearbeitet 01.08.2025 00:47:24

Applio is a voice conversion tool. Versions 3.2.7 and prior are vulnerable to server-side request forgery (SSRF) and file write in `model_download.py` (line 240 in 3.2.7). The blind SSRF allows for sending requests on behalf of Applio server and can ...

  • EPSS 0.08%
  • Veröffentlicht 19.03.2025 20:42:29
  • Zuletzt bearbeitet 01.08.2025 00:42:36

Applio is a voice conversion tool. Versions 3.2.7 and prior are vulnerable to server-side request forgery (SSRF) in `model_download.py` (line 195 in 3.2.7). The blind SSRF allows for sending requests on behalf of Applio server and can be leveraged to...

  • EPSS 2.44%
  • Veröffentlicht 19.03.2025 20:42:19
  • Zuletzt bearbeitet 01.08.2025 00:41:40

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `infer.py`. The issue can lead to remote code execution. As of time of publication, a fix is available on the `main` branch of the Applio r...

  • EPSS 2.51%
  • Veröffentlicht 19.03.2025 20:42:11
  • Zuletzt bearbeitet 01.08.2025 00:39:19

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in `model_blender.py` lines 20 and 21. `model_fusion_a` and `model_fusion_b` from voice_blender.py take user-supplied input (e.g. a path to a ...

Exploit
  • EPSS 1.67%
  • Veröffentlicht 19.03.2025 20:41:51
  • Zuletzt bearbeitet 01.08.2025 16:31:08

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file write in inference.py. This issue may lead to writing arbitrary files on the Applio server. It can also be used in conjunction with an unsafe deserial...

  • EPSS 0.97%
  • Veröffentlicht 19.03.2025 20:41:41
  • Zuletzt bearbeitet 01.08.2025 16:26:57

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file write in train.py. This issue may lead to writing arbitrary files on the Applio server. It can also be used in conjunction with an unsafe deserializat...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 19.03.2025 20:41:32
  • Zuletzt bearbeitet 01.08.2025 16:24:06

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file read in train.py's `export_pth` function. This issue may lead to reading arbitrary files on the Applio server. It can also be used in conjunction with...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 19.03.2025 20:41:09
  • Zuletzt bearbeitet 01.08.2025 16:03:19

Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to denial of service (DoS) in restart.py. `model_name` in train.py takes user input, and passes it to the `stop_train` function in restart.py, which uses it construct a...