Browse all 5 CVE security advisories affecting SedLex. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SedLex is a lexical analysis tool primarily used for parsing and processing text-based data in security research and development environments. Historically, SedLex has been associated with multiple remote code execution (RCE) vulnerabilities, cross-site scripting (XSS) flaws, and privilege escalation issues, with five CVEs currently documented. The tool's security characteristics include its complex parsing engine, which has been exploited through crafted input payloads. While no major public incidents have been widely reported, the consistent discovery of critical vulnerabilities in its parsing functionality highlights ongoing security challenges in handling untrusted input within text processing applications.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-41619 | WordPress Image Zoom Plugin <= 1.8.8 is vulnerable to Broken Access Control — Image ZoomCWE-862 | 5.4 | Medium | 2024-01-17 |
This page lists every published CVE security advisory associated with SedLex. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.