Description
All versions of the package node-bluetooth are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0990 | All versions of the package node-bluetooth are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation. |
Github GHSA |
GHSA-cxx3-36qc-m6qm | node-bluetooth is vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation |
References
| Link | Providers |
|---|---|
| https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTH-3311821 |
|
History
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-02-28T21:35:08.963Z
Reserved: 2023-02-20T10:28:48.922Z
Link: CVE-2023-26110
Updated: 2024-08-02T11:39:06.567Z
Status : Modified
Published: 2023-03-09T05:15:56.947
Modified: 2024-11-21T07:50:47.710
Link: CVE-2023-26110
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA