Browse all 4 CVE security advisories affecting alejandropascual. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Alejandropascual is a security researcher focused on identifying vulnerabilities in web applications and enterprise systems, with four CVEs primarily involving RCE and XSS flaws. Their work often centers on uncovering privilege escalation weaknesses in authentication mechanisms and API endpoints. While no major public incidents are directly attributed to this researcher, their CVE contributions highlight consistent patterns in input validation bypass techniques. The researcher typically targets widely-used platforms, demonstrating particular interest in content management systems and e-commerce frameworks. Their findings suggest a methodical approach to testing, with vulnerabilities often centered on insufficient sanitization of user-supplied data and insecure direct object references.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-0555 | Quick Restaurant Menu <= 2.0.2 - Missing Authorization — Quick Restaurant MenuCWE-862 | 8.1 | High | 2023-01-27 |
| CVE-2023-0554 | Quick Restaurant Menu <= 2.0.2 - Cross-Site Request Forgery — Quick Restaurant MenuCWE-352 | 8.1 | High | 2023-01-27 |
| CVE-2023-0553 | Quick Restaurant Menu <= 2.0.2 - Authenticated (Administrator+) Cross-Site Scripting — Quick Restaurant MenuCWE-79 | 4.4 | Medium | 2023-01-27 |
| CVE-2023-0550 | Quick Restaurant Menu <= 2.0.2 - Insecure Direct Object Reference — Quick Restaurant MenuCWE-639 | 8.1 | High | 2023-01-27 |
This page lists every published CVE security advisory associated with alejandropascual. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.