Gaizhenbiao

Chuanhuchatgpt

31 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.13%
  • Veröffentlicht 20.03.2025 10:11:38
  • Zuletzt bearbeitet 01.08.2025 18:15:03

An authentication bypass vulnerability exists in gaizhenbiao/ChuanhuChatGPT, as of commit 3856d4f, allowing any user to read and delete other users' chat history. The vulnerability arises because the username is provided via an HTTP request from the ...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 20.03.2025 10:11:38
  • Zuletzt bearbeitet 15.10.2025 13:15:55

A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240802 allows attackers to access, copy, and delete other users' chat histories. This issue arises due to improper handling of session data and lack of access control mechanisms, enabling attack...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 20.03.2025 10:11:29
  • Zuletzt bearbeitet 15.10.2025 13:15:36

An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue ...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 20.03.2025 10:11:12
  • Zuletzt bearbeitet 01.04.2025 20:32:15

A stored cross-site scripting (XSS) vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability allows an attacker to upload a malicious HTML file containing JavaScript code, which is then executed when the file is acc...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 20.03.2025 10:11:01
  • Zuletzt bearbeitet 15.10.2025 13:15:38

A Regular Expression Denial of Service (ReDoS) vulnerability exists in gaizhenbiao/chuanhuchatgpt, as of commit 20b2e02. The server uses the regex pattern `r'<[^>]+>'` to parse user input. In Python's default regex engine, this pattern can take polyn...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 20.03.2025 10:10:46
  • Zuletzt bearbeitet 09.07.2025 18:01:12

A Denial of Service (DoS) vulnerability exists in the file upload feature of gaizhenbiao/chuanhuchatgpt version 20240914. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. By sending a payloa...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 20.03.2025 10:10:13
  • Zuletzt bearbeitet 01.08.2025 18:19:22

An incorrect authorization vulnerability exists in gaizhenbiao/chuanhuchatgpt version git c91dbfc. The vulnerability allows any user to restart the server at will, leading to a complete loss of availability. The issue arises because the function resp...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 20.03.2025 10:10:12
  • Zuletzt bearbeitet 01.08.2025 18:25:11

A stored cross-site scripting (XSS) vulnerability exists in the gaizhenbiao/chuanhuchatgpt repository, affecting version git 20b2e02. The vulnerability arises from improper sanitization of HTML tags in chat history uploads. Specifically, the sanitiza...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 20.03.2025 10:09:56
  • Zuletzt bearbeitet 15.10.2025 13:15:36

gaizhenbiao/chuanhuchatgpt version git d4ec6a3 is affected by a local file inclusion vulnerability due to the use of the gradio component gr.JSON, which has a known issue (CVE-2024-4941). This vulnerability allows unauthenticated users to access arbi...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 20.03.2025 10:09:09
  • Zuletzt bearbeitet 09.07.2025 18:06:57

A Server-Side Request Forgery (SSRF) vulnerability was discovered in gaizhenbiao/chuanhuchatgpt version 20240914. The vulnerability allows an attacker to construct a response link by saving the response in a folder named after the SHA-1 hash of the t...