Deserialization of untrusted data vulnerability in Samsung Open Source Escargot Java Script allows denial of service condition via process abort.
This issue affects escarogt prior to commit hash
97e8115ab1110bc502b4b5e4a0c689a71520d335
References
| Link | Resource |
|---|---|
| https://github.com/Samsung/escargot/pull/1554 |
Configurations
No configuration.
History
13 Apr 2026, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Deserialization of untrusted data vulnerability in Samsung Open Source Escargot Java Script allows denial of service condition via process abort. This issue affects escarogt prior to commit hash 97e8115ab1110bc502b4b5e4a0c689a71520d335 |
13 Apr 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-13 01:16
Updated : 2026-04-13 15:01
NVD link : CVE-2026-25204
Mitre link : CVE-2026-25204
CVE.ORG link : CVE-2026-25204
JSON object : View
Products Affected
No product.
