{"uuid": "aeda1384-ddd2-4c48-9024-19f76f7f0a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7807", "type": "seen", "source": "https://t.me/cvedetector/9312", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7807 - \"Gaizhenbiao ChuanhuChatGPT Multipart Boundary Denial of Service Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-7807 \nPublished : Oct. 29, 2024, 1:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering ChuanhuChatGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and loss of productivity. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T14:46:34.000000Z"}