Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Heap-based Buffer Overflow vulnerabilities in an interactive lesson.
Start learningThere is no fixed version for scratchpad.
scratchpad is a create providing a stack-like memory allocator with double-ended allocation support.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the get and set functions in the Tracking trait. An attacker can achieve arbitrary memory access or cause a heap buffer overflow by providing a custom implementation that results in ill-formed raw pointers, which may later be dereferenced within safe APIs.