Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for vtk/vtk.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the vtkGLTFDocumentLoader::Accessor::Accessor() function. An attacker can execute arbitrary code or cause a crash by supplying a GLTF file that triggers improper memory read operations.
An attacker can cause the application to access memory that has already been freed by providing a specially crafted GLTF file with non-existent node indices.