Skip to main content

List of Possible Findings

C/C++

NameTypeDescriptionSeverity
Out-of-Bound Access ErrorRuntimeAccess of an element of an array with an index that's outside of the bounds of the array.6.0
Use After ReturnRuntimeAccess of a variable or pointer created on the stack by another function that has already returned.4.0
Use After ScopeRuntimeAccess of a variable or pointer on the stack, but the variable has already gone out of scope.4.0
Undefined BehaviorRuntimeVarious kinds of undefined behavior, for example dereferencing misaligned or null pointers.-
Out of MemoryCrashAllocation of memory beyond a given threshold.9.0
Global Buffer OverflowCrashWriting more data to a buffer than it can hold.9.0
Heap Buffer OverflowCrashWriting more data to a buffer located on the heap than it can hold.9.0
Heap Use After FreeCrashUsage of memory allocated on the heap after it has been freed or deleted.8.0
Stack Buffer OverflowCrashWriting more data to a buffer located on the stack than it can hold.7.0
Double FreeCrashCalling free() more than once with the same memory address as an argument.7.0
Segmentation FaultCrashAccess of memory that doesn't exist or to which the program has no access permissions.7.0
TimeoutCrashFuzzing input takes longer than the specified timeout.7.0
Stack ExhaustionCrashCall stack grows beyond the maximum allowed size.4.0
Alloc Dealloc MismatchCrashAllocated memory isn't properly freed.4.0
ODR ViolationCrashDuplicate symbols occur in the binary or its dependencies at runtime.4.0
Memory LeakCrashUnused memory isn't released.4.0
Deadly SignalCrashTermination of the test via a signal.4.0
Slow Input-A single invocation of the fuzz test succeeds, but takes unusually long to do so.2.0

Java (JVM)

NameTypeDescriptionSeverity
LDAP InjectionCrashUsage of untrusted data in an LDAP query.9.0
Remote JNDI LookupCrashUsage of Untrusted data in a JNDI lookup.9.0
OS Command InjectionCrashUsage of Untrusted data to execute OS commands.9.0
SQL InjectionCrashInsertion of a SQL query via the input data from the client to the application.8.0
Remote Code ExecutionCrashExecution of arbitrary code on a system.7.0
Load Arbitrary LibraryCrashUsage of untrusted data to load dynamic libraries.7.0
TimeoutCrashFuzzing input takes longer than the specified timeout.7.0
XPath InjectionCrashUsage of untrusted data to execute XPath queries.7.0
Server Side Request ForgeryCrashAble to send crafted requests from the system.5.0
Script Engine InjectionCrashExecution of malicious code by an application that uses a script engine.5.0
Deadly SignalCrashTermination of the test via a signal.4.0
Regular Expression InjectionCrashUsage of untrusted to execute regular expressions.1.0
Possible SQL InjectionWarningViolation of SQL syntax rules by in-progress query, possibly resulting in a SQL Injection.7.0
Array Out of BoundsWarningAccessing an array out of its defined bounds using a read or write operation.4.0
Negative Array SizeWarningAttempting to create an array with a negative size.4.0
Dereference of Null ObjectWarningDereferencing a null object reference.4.0
Number Format ExceptionWarningOccurs for example when converting a String to a numeric type.4.0
Java ExceptionWarningTrigger of an unhandled exception by the fuzzer.4.0
Slow Input-A single invocation of the fuzz test succeeds, but takes unusually long to do so.2.0

JavaScript

NameTypeDescriptionSeverity
Command InjectionCrashUsage of untrusted data to execute OS commands.9.0
Prototype PollutionCrashUser-controllable data can influence the prototype of an object.9.0
Path TraversalCrashAccess to arbitrary files and directories stored on the system by manipulating variables.5.0