Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade zevv/duc to version 1.4.6 or higher.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound in the buffer_get() function due to the use of size_t (an unsigned type). An attacker can cause an out-of-bounds read by providing crafted input that triggers a condition leading to underflow.