Latest CVE Feed
-
5.4
MEDIUMCVE-2025-5198
A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* th... Read more
- Published: May. 27, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Cross-Site Scripting
-
9.8
CRITICALCVE-2025-49840
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in inference_webui.py. The GPT_dropdown variable takes user input and passes it to the change_gpt_weights f... Read more
Affected Products : gpt-sovits-webui- Published: Jul. 15, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-49838
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPreDeEcho. The model_choose variable takes user input (e.g. a path to a model) and passes it ... Read more
Affected Products : gpt-sovits-webui- Published: Jul. 15, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-49836
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py change_label function. path_list takes user input, which is passed to the change_label function, whic... Read more
Affected Products : gpt-sovits-webui- Published: Jul. 15, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-49834
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py open_denoise function. denoise_inp_dir and denoise_opt_dir take user input, which is passed to the op... Read more
Affected Products : gpt-sovits-webui- Published: Jul. 15, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-49839
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to the ... Read more
Affected Products : gpt-sovits-webui- Published: Jul. 15, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-49837
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPre. The model_choose variable takes user input (e.g. a path to a model) and passes it to the... Read more
Affected Products : gpt-sovits-webui- Published: Jul. 15, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-49835
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py open_asr function. asr_inp_dir (and a number of other variables) takes user input, which is passed to... Read more
Affected Products : gpt-sovits-webui- Published: Jul. 15, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-49833
GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in the webui.py open_slice function. slice_opt_root and slice-inp-path takes user input, which is passed to the o... Read more
Affected Products : gpt-sovits-webui- Published: Jul. 15, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Injection
-
4.3
MEDIUMCVE-2024-1727
A Cross-Site Request Forgery (CSRF) vulnerability in gradio-app/gradio allows attackers to upload multiple large files to a victim's system if they are running Gradio locally. By crafting a malicious HTML page that triggers an unauthorized file upload to ... Read more
Affected Products : gradio- Published: Mar. 21, 2024
- Modified: Jul. 30, 2025
-
5.9
MEDIUMCVE-2024-1455
A vulnerability in the langchain-ai/langchain repository allows for a Billion Laughs Attack, a type of XML External Entity (XXE) exploitation. By nesting multiple layers of entities within an XML document, an attacker can cause the XML parser to consume e... Read more
Affected Products : langchain- Published: Mar. 26, 2024
- Modified: Jul. 30, 2025
-
6.5
MEDIUMCVE-2025-5472
The JSONReader in run-llama/llama_index versions 0.12.28 is vulnerable to a stack overflow due to uncontrolled recursive JSON parsing. This vulnerability allows attackers to trigger a Denial of Service (DoS) by submitting deeply nested JSON structures, le... Read more
Affected Products : llamaindex- Published: Jul. 07, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Denial of Service
-
9.1
CRITICALCVE-2025-4967
Esri Portal for ArcGIS 11.4 and prior allows a remote, unauthenticated attacker to bypass the Portal’s SSRF protections.... Read more
Affected Products : portal_for_arcgis- Published: May. 29, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Server-Side Request Forgery
-
9.8
CRITICALCVE-2025-2538
A hardcoded credential vulnerability exists in a specific deployment pattern for Esri Portal for ArcGIS versions 11.4 and below that may allow a remote unauthenticated attacker to gain administrative access to the system.... Read more
Affected Products : portal_for_arcgis- Published: Mar. 20, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Authentication
-
6.2
MEDIUMCVE-2025-6210
A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such... Read more
Affected Products : llamaindex- Published: Jul. 07, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2025-6209
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbi... Read more
Affected Products : llamaindex- Published: Jul. 07, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2025-6211
A vulnerability in the DocugamiReader class of the run-llama/llama_index repository, up to version 0.12.28, involves the use of MD5 hashing to generate IDs for document chunks. This approach leads to hash collisions when structurally distinct chunks conta... Read more
Affected Products : llamaindex- Published: Jul. 10, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Misconfiguration
-
9.4
CRITICALCVE-2025-54079
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in versions prior to 3.4.6 in the endpoint `/html/atendido/Profile_Atendido.php`, in the `idatendido` par... Read more
Affected Products : wegia- Published: Jul. 18, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-54078
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in versions prior to 3.4.6 in the `personalizacao_imagem.php` endpoint of the WeGI... Read more
Affected Products : wegia- Published: Jul. 18, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-54077
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in versions prior to 3.4.6 in the `personalizacao.php` endpoint of the WeGIA appli... Read more
Affected Products : wegia- Published: Jul. 18, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Cross-Site Scripting