All versions of the package node-twain are vulnerable to Improper Check or Handling of Exceptional Conditions due to the length of the source data not being checked. Creating a new twain.TwainSDK with a productName or productFamily, manufacturer, version.info property of length >= 34 chars leads to a buffer overflow vulnerability.
References
Configurations
No configuration.
History
21 Nov 2024, 08:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/dellalibera/55b87634a6c360e5be22a715f0566c99 - | |
References | () https://security.snyk.io/vuln/SNYK-JS-NODETWAIN-6421153 - |
11 Jul 2024, 13:05
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-10 05:15
Updated : 2024-11-21 08:54
NVD link : CVE-2024-21525
Mitre link : CVE-2024-21525
CVE.ORG link : CVE-2024-21525
JSON object : View
Products Affected
No product.
CWE
CWE-703
Improper Check or Handling of Exceptional Conditions