Gaizhenbiao

Chuanhuchatgpt

31 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.21%
  • Veröffentlicht 27.06.2024 19:15:19
  • Zuletzt bearbeitet 15.10.2025 13:15:49

A path traversal vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410, allowing any user to delete other users' chat histories. This vulnerability can also be exploited to delete any files ending in `.json` on the target system, leadin...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 27.06.2024 19:15:19
  • Zuletzt bearbeitet 15.10.2025 13:15:48

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability is located in the filter_history function within the utils.py module. This function takes a user-provided keywo...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 27.06.2024 19:15:16
  • Zuletzt bearbeitet 15.07.2025 15:34:23

A Server-Side Request Forgery (SSRF) vulnerability exists in the upload processing interface of gaizhenbiao/ChuanhuChatGPT versions <= ChuanhuChatGPT-20240410-git.zip. This vulnerability allows attackers to send crafted requests from the vulnerable s...

Exploit
  • EPSS 0.51%
  • Veröffentlicht 06.06.2024 19:16:07
  • Zuletzt bearbeitet 15.10.2025 13:15:46

gaizhenbiao/chuanhuchatgpt is vulnerable to an unrestricted file upload vulnerability due to insufficient validation of uploaded file types in its `/upload` endpoint. Specifically, the `handle_file_upload` function does not sanitize or validate the f...

Exploit
  • EPSS 46.13%
  • Veröffentlicht 06.06.2024 19:16:03
  • Zuletzt bearbeitet 21.11.2024 09:47:01

A timing attack vulnerability exists in the gaizhenbiao/chuanhuchatgpt repository, specifically within the password comparison logic. The vulnerability is present in version 20240310 of the software, where passwords are compared using the '=' operato...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 06.06.2024 19:16:01
  • Zuletzt bearbeitet 15.10.2025 13:15:43

In gaizhenbiao/chuanhuchatgpt, specifically the version tagged as 20240121, there exists a vulnerability due to improper access control mechanisms. This flaw allows an authenticated attacker to bypass intended access restrictions and read the `histor...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 06.06.2024 19:16:01
  • Zuletzt bearbeitet 21.11.2024 09:29:31

A stored Cross-Site Scripting (XSS) vulnerability existed in version (20240121) of gaizhenbiao/chuanhuchatgpt due to inadequate sanitization and validation of model output data. Despite user-input validation efforts, the application fails to properly...

Exploit
  • EPSS 67.57%
  • Veröffentlicht 06.06.2024 19:16:01
  • Zuletzt bearbeitet 21.11.2024 09:29:12

The gaizhenbiao/chuanhuchatgpt application is vulnerable to a path traversal attack due to its use of an outdated gradio component. The application is designed to restrict user access to resources within the `web_assets` folder. However, the outdated...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 04.06.2024 20:15:11
  • Zuletzt bearbeitet 15.10.2025 13:15:45

An improper access control vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically in version 20240410. This vulnerability allows any user on the server to access the chat history of any other user without requiring any form ...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 16.05.2024 09:15:16
  • Zuletzt bearbeitet 10.07.2025 16:21:16

A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths duri...