
CVE-2023-29566
https://notcve.org/view.php?id=CVE-2023-29566
24 Apr 2023 — huedawn-tesseract 0.3.3 and dawnsparks-node-tesseract 0.4.0 to 0.4.1 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function. • https://github.com/omnitaint/Vulnerability-Reports/blob/ec3645003c7f8996459b5b24c722474adc2d599f/reports/dawnsparks-node-tesseract/report.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2022-38266 – Gentoo Linux Security Advisory 202312-01
https://notcve.org/view.php?id=CVE-2022-38266
09 Sep 2022 — An issue in the Leptonica linked library (v1.79.0) allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file. Un problema en la biblioteca enlazada Leptonica (v1.79.0) permite a los atacantes provocar una excepción aritmética que conduce a una denegación de servicio (DoS) a través de un archivo JPEG manipulado Several vulnerabilities have been found in Leptonice, the worst of which could lead to arbitrary code execution. Versions greater than or equal to ... • https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614 • CWE-369: Divide By Zero •

CVE-2020-28453 – Command Injection
https://notcve.org/view.php?id=CVE-2020-28453
02 Aug 2022 — This affects all versions of package npos-tesseract. The injection point is located in line 55 in lib/ocr.js. Esto afecta a todas las versiones del paquete npos-tesseract. El punto de inyección es encontrado en la línea 55 del archivo lib/ocr.js • https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2021-36081
https://notcve.org/view.php?id=CVE-2021-36081
01 Jul 2021 — Tesseract OCR 5.0.0-alpha-20201231 has a one_ell_conflict use-after-free during a strpbrk call. Tesseract OCR versión 5.0.0-alpha-2020123,1 presenta un uso de memoria previamente liberada en la función one_ell_conflict durante una llamada a strpbrk • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29698 • CWE-416: Use After Free •

CVE-2011-1136
https://notcve.org/view.php?id=CVE-2011-1136
14 Nov 2019 — In tesseract 2.03 and 2.04, an attacker can rewrite an arbitrary user file by guessing the PID and creating a link to the user's file. En tesseract versiones 2.03 y 2.04, un atacante puede reescribir un archivo de usuario arbitrario al adivinar el PID y creando un enlace en el archivo de usuario. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612032 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •