Latest CVE Feed
-
3.3
LOWCVE-2025-20233
In the Splunk App for Lookup File Editing versions below 4.0.5, a script in the app used the `chmod` and `makedirs` Python functions in a way that resulted in overly broad read and execute permissions. This could lead to improper access control for a low-... Read more
Affected Products : splunk_app_for_lookup_file_editing- Published: Mar. 26, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-20230
In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could edit and... Read more
- Published: Mar. 26, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Authorization
-
8.4
HIGHCVE-2025-1781
There is a XXE in W3CSS Validator versions before cssval-20250226 that allows an attacker to use specially-crafted XML objects to coerce server-side request forgery (SSRF). This could be exploited to read arbitrary local files if an attacker has access t... Read more
Affected Products : css_validator- Published: Mar. 28, 2025
- Modified: Aug. 01, 2025
-
5.5
MEDIUMCVE-2025-8224
A vulnerability has been found in GNU Binutils 2.44 and classified as problematic. This vulnerability affects the function bfd_elf_get_str_section of the file bfd/elf.c of the component BFD Library. The manipulation leads to null pointer dereference. Loca... Read more
Affected Products : binutils- Published: Jul. 27, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Denial of Service
-
4.8
MEDIUMCVE-2025-8225
A vulnerability was found in GNU Binutils 2.44 and classified as problematic. This issue affects the function process_debug_info of the file binutils/dwarf.c of the component DWARF Section Handler. The manipulation leads to memory leak. Attacking locally ... Read more
Affected Products : binutils- Published: Jul. 27, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Memory Corruption
-
4.8
MEDIUMCVE-2025-20203
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of ... Read more
- Published: Apr. 02, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Cross-Site Scripting
-
9.8
CRITICALCVE-2025-43842
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7, trainset_dir4 and sr2 take user input and pass it to the preprocess_dataset... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-43843
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, np7 and f0method8 take user input and pass it into the extract_f0_feature functi... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-43844
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables exp_dir1, among others, take user input and pass it to the click_train function, which con... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-43845
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to code injection. The ckpt_path2 variable takes user input (e.g. a path to a model) and passes it to change_info_ function, w... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-43846
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path1 variable takes user input (e.g. a path to a model) and passes it to the show_info fu... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-43847
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path2 variable takes user input (e.g. a path to a model) and passes it to the extract_smal... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-43848
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_path0 variable takes user input (e.g. a path to a model) and passes it to the change_info ... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-43849
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_a and cpkt_b variables take user input (e.g. a path to a model) and pass it to the merge f... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-43850
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The ckpt_dir variable takes user input (e.g. a path to a model) and passes it to the change_info fu... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-43851
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr functi... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
-
9.8
CRITICALCVE-2025-43852
Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The model_choose variable takes user input (e.g. a path to a model) and passes it to the uvr functi... Read more
Affected Products : retrieval-based-voice-conversion-webui- Published: May. 05, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-32030
Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive t... Read more
Affected Products : apollo_gateway- Published: Apr. 07, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-32031
Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive t... Read more
Affected Products : apollo_gateway- Published: Apr. 07, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2025-27780
Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to unsafe deserialization in model_information.py. `model_name` in model_information.py takes user-supplied input (e.g. a path to a model) and pass that value to the `run_mo... Read more
Affected Products : applio- Published: Mar. 19, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration