Deserialization of untrusted data vulnerability in Samsung Open Source Escargot Java Script allows denial of service condition via process abort.
This issue affects escarogt prior to commit hash
97e8115ab1110bc502b4b5e4a0c689a71520d335
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/Samsung/escargot/pull/1554 |
|
History
Mon, 13 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Denial of Service via Untrusted Data Deserialization in Samsung Escargot |
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Samsung Open Source
Samsung Open Source escargot |
|
| Vendors & Products |
Samsung Open Source
Samsung Open Source escargot |
Mon, 13 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of untrusted data vulnerability in Samsung Open Source Escarogt Java Script allows denial of service condition via process abort. This issue affects escarogt prior to commit hash 97e8115ab1110bc502b4b5e4a0c689a71520d335 | Deserialization of untrusted data vulnerability in Samsung Open Source Escargot Java Script allows denial of service condition via process abort. This issue affects escarogt prior to commit hash 97e8115ab1110bc502b4b5e4a0c689a71520d335 |
Mon, 13 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of untrusted data vulnerability in Samsung Open Source Escarogt Java Script allows denial of service condition via process abort. This issue affects escarogt prior to commit hash 97e8115ab1110bc502b4b5e4a0c689a71520d335 | |
| Weaknesses | CWE-502 CWE-843 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: samsung.tv_appliance
Published: 2026-04-13T00:47:31.806Z
Updated: 2026-04-13T18:06:17.946Z
Reserved: 2026-01-30T06:07:11.090Z
Link: CVE-2026-25204
Updated: 2026-04-13T17:58:04.251Z
Status : Awaiting Analysis
Published: 2026-04-13T01:16:35.313
Modified: 2026-04-13T15:01:43.663
Link: CVE-2026-25204
No data.
ReportizFlow