<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2024-0194 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0194/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Tue, 21 Apr 2026 18:24:45 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2024-0194</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0194/#post-700</link>
                        <pubDate>Tue, 22 Oct 2024 18:32:46 +0000</pubDate>
                        <description><![CDATA[Description
A vulnerability, which was classified as critical, has been found in CodeAstro Internet Banking System up to 1.0. This issue affects some unknown processing of the file pages_ac...]]></description>
                        <content:encoded><![CDATA[<p><strong>Description</strong></p>
<p><span>A vulnerability, which was classified as critical, has been found in CodeAstro Internet Banking System up to 1.0. This issue affects some unknown processing of the file pages_account.php of the component Profile Picture Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249509 was assigned to this vulnerability.</span></p>
<p><strong>References</strong></p>
<ul>
<li><a href="https://drive.google.com/file/d/147yg6oMHoJ1WvhH-TT0-GXDjKyNCSoeX/view?usp=sharing" target="_blank" rel="noopener">MISC:https://drive.google.com/file/d/147yg6oMHoJ1WvhH-TT0-GXDjKyNCSoeX/view?usp=sharing</a></li>
<li><a href="https://drive.google.com/file/d/147yg6oMHoJ1WvhH-TT0-GXDjKyNCSoeX/view?usp=sharing" target="_blank" rel="noopener">URL:https://drive.google.com/file/d/147yg6oMHoJ1WvhH-TT0-GXDjKyNCSoeX/view?usp=sharing</a></li>
<li><a href="https://vuldb.com/?ctiid.249509" target="_blank" rel="noopener">MISC:https://vuldb.com/?ctiid.249509</a></li>
<li><a href="https://vuldb.com/?ctiid.249509" target="_blank" rel="noopener">URL:https://vuldb.com/?ctiid.249509</a></li>
<li><a href="https://vuldb.com/?id.249509" target="_blank" rel="noopener">MISC:https://vuldb.com/?id.249509</a></li>
<li><a href="https://vuldb.com/?id.249509" target="_blank" rel="noopener">URL:https://vuldb.com/?id.249509</a></li>
</ul>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>worldlovely</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0194/#post-700</guid>
                    </item>
							        </channel>
        </rss>
		