Browse all 3 CVE security advisories affecting denishua. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Denishua operates in the cybersecurity domain, providing threat intelligence and vulnerability management solutions. Historically, the organization's products have been associated with common vulnerability classes including remote code execution (RCE), cross-site scripting (XSS), and privilege escalation flaws. Denishua has demonstrated notable security characteristics through its CVE contributions, with three documented vulnerabilities to date. While no major public security incidents have been reported, the presence of CVEs indicates potential weaknesses in their software that could be exploited by attackers. The organization's focus remains on enhancing security postures for enterprises through continuous vulnerability assessment and remediation support.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-32523 | WordPress WPJAM Basic plugin <= 6.9.2 - Arbitrary File Upload vulnerability — WPJAM BasicCWE-434 | 9.9 | Critical | 2026-03-25 |
| CVE-2025-12827 | Top Friends <= 0.3 - Cross-Site Request Forgery to Settings Update — Top FriendsCWE-352 | 4.3 | Medium | 2025-11-18 |
| CVE-2023-25051 | WordPress Comment Reply Notification Plugin <= 1.4 is vulnerable to Cross Site Request Forgery (CSRF) — Comment Reply NotificationCWE-352 | 4.3 | Medium | 2023-07-11 |
This page lists every published CVE security advisory associated with denishua. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.