Browse all 5 CVE security advisories affecting lxsmnsyc. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Lxsmnsyc primarily develops network security tools and penetration testing platforms. Historically, its products have been associated with multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues. The five CVEs recorded for this vendor highlight recurring input validation weaknesses and insufficient access controls in their web interfaces. While no major public security incidents have been documented, the consistent pattern of similar vulnerability types suggests potential systemic issues in their secure development lifecycle. Their tools remain popular among security professionals despite these concerns, indicating a trade-off between functionality and security postures in their product design.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-24006 | Seroval affected by Denial of Service via Deeply Nested Objects — serovalCWE-770 | 7.5 | High | 2026-01-22 |
| CVE-2026-23957 | seroval is vulnerable to Denial of Service via array serialization — serovalCWE-770 | 7.5 | High | 2026-01-22 |
| CVE-2026-23956 | seroval affected by Denial of Service via RegExp serialization — serovalCWE-1333 | 7.5 | High | 2026-01-22 |
| CVE-2026-23737 | seroval Affected by Remote Code Execution via JSON Deserialization — serovalCWE-502 | 7.5 | High | 2026-01-21 |
| CVE-2026-23736 | seroval Affected by Prototype Pollution via JSON Deserialization — serovalCWE-1321 | 7.3 | High | 2026-01-21 |
This page lists every published CVE security advisory associated with lxsmnsyc. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.