All versions of package fast-string-search are vulnerable to Out-of-bounds Read due to incorrect memory freeing and length calculation for any non-string input as the source. This allows the attacker to read previously allocated memory.
                
            References
                    | Link | Resource | 
|---|---|
| https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392368 | Exploit Third Party Advisory | 
| https://github.com/magiclen/node-fast-string-search/blob/c8dd9fc966abc80b327f509e63360f59e0de9fb5/src/fast-string-search.c%23L192 | Broken Link Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Information
                Published : 2022-06-17 13:15
Updated : 2022-06-28 08:39
NVD link : CVE-2022-25872
Mitre link : CVE-2022-25872
JSON object : View
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
Products Affected
                fast_string_search_project
- fast_string_search


