Browse all 4 CVE security advisories affecting demonisblack. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Demonisblack operates in cybersecurity research, focusing on identifying vulnerabilities in web applications and enterprise systems. Their work primarily centers on uncovering remote code execution and cross-site scripting flaws, with privilege escalation being a recurring theme in their findings. The researcher maintains a moderate CVE count of four, suggesting selective disclosure targeting high-impact issues. While no major public incidents are directly attributed to them, their contributions to vulnerability databases indicate a methodical approach to security research. Their profile reflects a researcher who prioritizes technical depth over volume, consistently addressing critical weaknesses that could compromise system integrity and enable unauthorized access.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-4083 | Scoreboard for HTML5 Games Lite <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes — Scoreboard for HTML5 Games LiteCWE-79 | 6.4 | Medium | 2026-03-20 |
| CVE-2023-40215 | WordPress Demon image annotation Plugin <= 5.1 is vulnerable to SQL Injection — demon image annotationCWE-89 | 7.6 | High | 2023-11-03 |
| CVE-2022-4171 | demon image annotation <= 5.0 - Improper Input Restriction Validation — demon image annotationCWE-1284 | 6.5 | Medium | 2022-12-13 |
| CVE-2022-2864 | WordPress plugin demon image annotation 跨站请求伪造漏洞 — demon image annotation | 8.8 | High | 2022-10-28 |
This page lists every published CVE security advisory associated with demonisblack. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.