This issue affects escarogt prior to commit hash
97e8115ab1110bc502b4b5e4a0c689a71520d335
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/Samsung/escargot/pull/1554 |
|
Mon, 13 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Denial of Service via Untrusted Data Deserialization in Samsung Escargot |
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Samsung Open Source
Samsung Open Source escargot |
|
| Vendors & Products |
Samsung Open Source
Samsung Open Source escargot |
Mon, 13 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of untrusted data vulnerability in Samsung Open Source Escarogt Java Script allows denial of service condition via process abort. This issue affects escarogt prior to commit hash 97e8115ab1110bc502b4b5e4a0c689a71520d335 | Deserialization of untrusted data vulnerability in Samsung Open Source Escargot Java Script allows denial of service condition via process abort. This issue affects escarogt prior to commit hash 97e8115ab1110bc502b4b5e4a0c689a71520d335 |
Mon, 13 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of untrusted data vulnerability in Samsung Open Source Escarogt Java Script allows denial of service condition via process abort. This issue affects escarogt prior to commit hash 97e8115ab1110bc502b4b5e4a0c689a71520d335 | |
| Weaknesses | CWE-502 CWE-843 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: samsung.tv_appliance
Published:
Updated: 2026-04-14T07:45:27.372Z
Reserved: 2026-01-30T06:07:11.090Z
Link: CVE-2026-25204
Updated: 2026-04-13T17:58:04.251Z
Status : Awaiting Analysis
Published: 2026-04-13T01:16:35.313
Modified: 2026-04-13T15:01:43.663
Link: CVE-2026-25204
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:53:46Z