Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 07 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Spin.js
Spin.js spin.js |
|
| CPEs | cpe:2.3:a:spin.js:spin.js:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Spin.js
Spin.js spin.js |
Fri, 20 Mar 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cross‑Site Scripting Vulnerability in spin.js via Prototype Pollution and Duplicate Alert Creation |
Wed, 11 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fgnass
Fgnass spin.js |
|
| Vendors & Products |
Fgnass
Fgnass spin.js |
Wed, 11 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package spin.js before 3.0.0 are vulnerable to Cross-site Scripting (XSS) via the spin() function that allows a creation of more than 1 alert for each 'target' element. An attacker would need to set an arbitrary key-value pair on Object.prototype through a crafted URL achieving a prototype pollution first, before being able to execute arbitrary JavaScript in the context of the user's browser. | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-03-11T15:45:37.336Z
Reserved: 2026-03-10T15:23:07.934Z
Link: CVE-2026-3884
Updated: 2026-03-11T15:45:34.043Z
Status : Analyzed
Published: 2026-03-11T06:17:15.183
Modified: 2026-05-07T18:08:05.353
Link: CVE-2026-3884
No data.
OpenCVE Enrichment
Updated: 2026-03-20T14:37:55Z