Rvc-boss

Gpt-sovits-webui

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.22%
  • Veröffentlicht 15.07.2025 20:43:02
  • Zuletzt bearbeitet 30.07.2025 20:15:43

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in process_ckpt.py. The SoVITS_dropdown variable takes user input and passes it to the load_sovits_new...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 15.07.2025 20:42:09
  • Zuletzt bearbeitet 30.07.2025 20:15:19

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in inference_webui.py. The GPT_dropdown variable takes user input and passes it to the change_gpt_weig...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 15.07.2025 20:40:18
  • Zuletzt bearbeitet 30.07.2025 20:13:19

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in bsroformer.py. The model_choose variable takes user input (e.g. a path to a model) and passes it to...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 15.07.2025 20:36:46
  • Zuletzt bearbeitet 30.07.2025 20:14:38

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPreDeEcho. The model_choose variable takes user input (e.g. a path to a model) and passe...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 15.07.2025 20:34:47
  • Zuletzt bearbeitet 30.07.2025 20:12:51

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is an unsafe deserialization vulnerability in vr.py AudioPre. The model_choose variable takes user input (e.g. a path to a model) and passes it t...

Exploit
  • EPSS 0.8%
  • Veröffentlicht 15.07.2025 20:31:57
  • Zuletzt bearbeitet 30.07.2025 20:14:14

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py change_label function. path_list takes user input, which is passed to the change_label function,...

Exploit
  • EPSS 0.63%
  • Veröffentlicht 15.07.2025 20:29:43
  • Zuletzt bearbeitet 30.07.2025 20:12:16

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py open_asr function. asr_inp_dir (and a number of other variables) takes user input, which is pass...

Exploit
  • EPSS 0.8%
  • Veröffentlicht 15.07.2025 20:25:03
  • Zuletzt bearbeitet 30.07.2025 20:13:55

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in webui.py open_denoise function. denoise_inp_dir and denoise_opt_dir take user input, which is passed to t...

Exploit
  • EPSS 0.63%
  • Veröffentlicht 15.07.2025 20:22:49
  • Zuletzt bearbeitet 30.07.2025 20:11:57

GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In versions 20250228v3 and prior, there is a command injection vulnerability in the webui.py open_slice function. slice_opt_root and slice-inp-path takes user input, which is passed to ...