Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0990 | All versions of the package node-bluetooth are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation. |
Github GHSA |
GHSA-cxx3-36qc-m6qm | node-bluetooth is vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation |
| Link | Providers |
|---|---|
| https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTH-3311821 |
|
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-02-28T21:35:08.963Z
Reserved: 2023-02-20T10:28:48.922Z
Link: CVE-2023-26110
Updated: 2024-08-02T11:39:06.567Z
Status : Modified
Published: 2023-03-09T05:15:56.947
Modified: 2024-11-21T07:50:47.710
Link: CVE-2023-26110
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA