Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gaizhenbiao chuanhuchatgpt
|
|
| CPEs | cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gaizhenbiao chuanhuchatgpt
|
Tue, 05 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:gaizhenbiao:gaizhenbiao\/chuanhuchatgpt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt |
|
| Metrics |
cvssV3_1
|
Mon, 04 Nov 2024 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | gaizhenbiao/chuanhuchatgpt project, version <=20240802 is vulnerable to stored Cross-Site Scripting (XSS) in WebSocket session transmission. An attacker can inject malicious content into a WebSocket message. When a victim accesses this session, the malicious JavaScript is executed in the victim's browser. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-05T21:24:41.074Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48059
Updated: 2024-11-05T21:24:32.807Z
Status : Analyzed
Published: 2024-11-04T23:15:04.470
Modified: 2025-07-11T13:58:03.783
Link: CVE-2024-48059
No data.
OpenCVE Enrichment
No data.