CVE-2026-47316
Improper Exception Handling in Escargot JavaScript Engine
Publication date: 2026-05-19
Last updated on: 2026-05-19
Assigner: Samsung TV & Appliance
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| samsung | escargot | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-703 | The product does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the product. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update the Samsung Escargot software to the latest version that includes the fix for the crash issues.
The fix is available in the pull request #1565 on the Samsung Escargot GitHub repository.
Can you explain this vulnerability to me?
This vulnerability is an Improper Check or Handling of Exceptional Conditions in Samsung Open Source Escargot. It allows for Input Data Manipulation, meaning that the software does not correctly handle certain exceptional or unexpected input conditions, which could be exploited.
How can this vulnerability impact me? :
The vulnerability has a CVSS base score of 5.5 with the vector indicating local attack complexity is low, no privileges required, user interaction required, and it impacts availability. This means an attacker with local access and user interaction could manipulate input data to cause a denial of service or disrupt availability of the affected Escargot component.