Browse all 3 CVE security advisories affecting akashmalik. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Akashmalik develops web applications and APIs for enterprise clients, with a core focus on custom business solutions. Historically, their codebase has shown vulnerabilities in remote code execution, cross-site scripting, and privilege escalation, particularly in authentication mechanisms. Security assessments reveal inconsistent input validation and insufficient session management. While no major public breaches are documented, their CVE history indicates recurring issues in server-side request forgery and insecure direct object references. The organization has demonstrated gradual improvement in patch response times but maintains a moderate risk profile due to persistent coding flaws in legacy systems.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-13316 | Scratch & Win – Giveaways and Contests <= 2.8.0 - Missing Authorization to Unauthenticated Coupon Creation — Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and moreCWE-862 | 5.3 | Medium | 2025-02-18 |
| CVE-2024-12545 | Scratch & Win – Giveaways and Contests <= 2.7.1 - Cross-Site Request Forgery via reset_installation Function — Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and moreCWE-352 | 5.4 | Medium | 2025-01-04 |
| CVE-2024-11898 | Scratch & Win – Giveaways and Contests <= 2.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting — Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and moreCWE-79 | 6.4 | Medium | 2024-12-03 |
This page lists every published CVE security advisory associated with akashmalik. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.