Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yahoo serialize
|
|
| CPEs | cpe:2.3:a:yahoo:serialize:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yahoo serialize
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yahoo
Yahoo serialize-javascript |
|
| Vendors & Products |
Yahoo
Yahoo serialize-javascript |
Thu, 02 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-835 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 31 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5. | |
| Title | Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects | |
| Weaknesses | CWE-400 CWE-834 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-31T01:48:45.759Z
Updated: 2026-03-31T13:55:54.998Z
Reserved: 2026-03-25T15:29:04.745Z
Link: CVE-2026-34043
Updated: 2026-03-31T13:55:49.732Z
Status : Analyzed
Published: 2026-03-31T03:15:58.400
Modified: 2026-04-03T16:53:52.573
Link: CVE-2026-34043