Latest CVE Feed
-
8.4
HIGHCVE-2025-1781
There is a XXE in W3CSS Validator versions before cssval-20250226 that allows an attacker to use specially-crafted XML objects to coerce server-side request forgery (SSRF). This could be exploited to read arbitrary local files if an attacker has access t... Read more
Affected Products : css_validator- Published: Mar. 28, 2025
- Modified: Aug. 01, 2025
-
5.5
MEDIUMCVE-2025-8224
A vulnerability has been found in GNU Binutils 2.44 and classified as problematic. This vulnerability affects the function bfd_elf_get_str_section of the file bfd/elf.c of the component BFD Library. The manipulation leads to null pointer dereference. Loca... Read more
Affected Products : binutils- Published: Jul. 27, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Denial of Service
-
4.8
MEDIUMCVE-2025-8225
A vulnerability was found in GNU Binutils 2.44 and classified as problematic. This issue affects the function process_debug_info of the file binutils/dwarf.c of the component DWARF Section Handler. The manipulation leads to memory leak. Attacking locally ... Read more
Affected Products : binutils- Published: Jul. 27, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2025-2713
Google gVisor's runsc component exhibited a local privilege escalation vulnerability due to incorrect handling of file access permissions, which allowed unprivileged users to access restricted files. This occurred because the process initially ran with ro... Read more
Affected Products : gvisor- Published: Mar. 28, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Authorization
-
4.8
MEDIUMCVE-2025-20203
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of ... Read more
- Published: Apr. 02, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Cross-Site Scripting
-
9.8
CRITICALCVE-2025-43842
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7, trainset_dir4 and sr2 take user input and pass it to the preprocess_dataset... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-43843
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7 and f0method8 take user input and pass it into the extract_f0_feature functi... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-43844
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, among others, take user input and pass it to the click_train function, which con... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-43845
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to code injection. The ckpt_path2 variable takes user input (e.g. a path to a model) and passes it to change_info_ function, w... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-43846
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path1 variable takes user input (e.g. a path to a model) and passes it to the show_info fu... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-43847
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path2 variable takes user input (e.g. a path to a model) and passes it to the extract_smal... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-43848
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path0 variable takes user input (e.g. a path to a model) and passes it to the change_info ... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-43849
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_a and cpkt_b variables take user input (e.g. a path to a model) and pass it to the merge f... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-43850
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_dir variable takes user input (e.g. a path to a model) and passes it to the change_info fu... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-43851
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr functi... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
-
9.8
CRITICALCVE-2025-43852
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr functi... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-32030
Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive t... Read more
Affected Products : apollo_gateway- Published: Apr. 07, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-32031
Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive t... Read more
Affected Products : apollo_gateway- Published: Apr. 07, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2025-27780
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in model_information.py. `model_name` in model_information.py takes user-supplied input (e.g. a path to a model) and pass that value to the `run_mo... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-27781
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in inference.py. `model_file` in inference.py as well as `model_file` in tts.py take user-supplied input (e.g. a path to a model) and pass that val... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration