Логотип exploitDog
bind:CVE-2026-30226
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-30226

Количество 3

Количество 3

redhat логотип

CVE-2026-30226

16 дней назад

A flaw was found in the Svelte devalue JavaScript library. A remote attacker could exploit a prototype pollution vulnerability by sending maliciously crafted payloads to the devalue.parse or devalue.unflatten functions. Successful exploitation of this flaw could lead to a Denial of Service (DoS) condition, making the affected system unavailable, or result in type confusion, which could have further unpredictable impacts.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2026-30226

16 дней назад

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. In devalue v5.6.3 and earlier, devalue.parse and devalue.unflatten were susceptible to prototype pollution via maliciously crafted payloads. Successful exploitation could lead to Denial of Service (DoS) or type confusion. This vulnerability is fixed in 5.6.4.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-cfw5-2vxh-hr84

15 дней назад

devalue has prototype pollution in devalue.parse and devalue.unflatten

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-30226

A flaw was found in the Svelte devalue JavaScript library. A remote attacker could exploit a prototype pollution vulnerability by sending maliciously crafted payloads to the devalue.parse or devalue.unflatten functions. Successful exploitation of this flaw could lead to a Denial of Service (DoS) condition, making the affected system unavailable, or result in type confusion, which could have further unpredictable impacts.

CVSS3: 5.9
0%
Низкий
16 дней назад
nvd логотип
CVE-2026-30226

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. In devalue v5.6.3 and earlier, devalue.parse and devalue.unflatten were susceptible to prototype pollution via maliciously crafted payloads. Successful exploitation could lead to Denial of Service (DoS) or type confusion. This vulnerability is fixed in 5.6.4.

CVSS3: 7.5
0%
Низкий
16 дней назад
github логотип
GHSA-cfw5-2vxh-hr84

devalue has prototype pollution in devalue.parse and devalue.unflatten

0%
Низкий
15 дней назад

Уязвимостей на страницу