Metrics
Affected Vendors & Products
Fri, 24 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
274056675
274056675 springboot-openai-chatgpt |
|
| CPEs | cpe:2.3:a:274056675:springboot-openai-chatgpt:2024-12-29:*:*:*:*:*:*:* | |
| Vendors & Products |
274056675
274056675 springboot-openai-chatgpt |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 18 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 15 Mar 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in 274056675 springboot-openai-chatgpt e84f6f5 and classified as critical. Affected by this issue is some unknown functionality of the file /api/mjkj-chat/cgform-api/addData/. The manipulation of the argument chatUserID leads to business logic errors. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | 274056675 springboot-openai-chatgpt addData logic error | |
| Weaknesses | CWE-840 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-03-15T12:00:10.514Z
Updated: 2025-03-18T16:19:00.726Z
Reserved: 2025-03-14T17:07:40.847Z
Link: CVE-2025-2321
Updated: 2025-03-17T15:14:43.204Z
Status : Analyzed
Published: 2025-03-15T12:15:12.393
Modified: 2025-10-24T18:36:31.593
Link: CVE-2025-2321
No data.