### [CVE-2024-21525](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21525) ![](https://img.shields.io/static/v1?label=Product&message=node-twain&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions&color=brighgreen) ### Description All versions of the package node-twain are vulnerable to Improper Check or Handling of Exceptional Conditions due to the length of the source data not being checked. Creating a new twain.TwainSDK with a productName or productFamily, manufacturer, version.info property of length >= 34 chars leads to a buffer overflow vulnerability. ### POC #### Reference - https://gist.github.com/dellalibera/55b87634a6c360e5be22a715f0566c99 - https://security.snyk.io/vuln/SNYK-JS-NODETWAIN-6421153 #### Github - https://github.com/dellalibera/dellalibera