Skip to main content

List of possible Findings

C/C++

NameTypeDescriptionSeverity
Out-of-Bound Access ErrorRuntimeAn element of an array is accessed with an index that is outside of the bounds of the array.6.0
Use After ReturnRuntimeA variable (or pointer) is accessed that was created on the stack by another function that has already returned.4.0
Use After ScopeRuntimeA variable (or pointer) on the stack is accessed, but the variable has already gone out of scope.4.0
Undefined BehaviorRuntimeVarious kinds of undefined behavior, e.g. dereferencing misaligned or null pointers.-
Out of MemoryCrashThe application under test tries to allocate more memory than a given threshold.9.0
Global Buffer OverflowCrashMore data is written to a buffer than it can hold.9.0
Heap Buffer OverflowCrashMore data is written to a buffer located on the heap than it can hold, causing the buffer to overflow into adjacent memory.9.0
Heap Use After FreeCrashMemory allocated on the heap is used after it has been freed or deleted.8.0
Stack Buffer OverflowCrashMore data is written to a buffer located on the stack than it can hold, causing the buffer to overflow into adjacent memory.7.0
Double FreeCrashfree() is called more than once with the same memory address as an argument.7.0
Segmentation FaultCrashMemory is accessed that doesn't exist or to which the program has no access permissions.7.0
TimeoutCrashA fuzzing input takes longer than the specified timeout.7.0
Stack ExhaustionCrashThe call stack grows beyond the maximum allowed size.4.0
Alloc Dealloc MismatchCrashAllocated memory is not properly freed.4.0
ODR ViolationCrashDuplicate symbols occur in the binary or its dependencies at runtime.4.0
Memory LeakCrashMemory that is no longer used is not released.4.0
Deadly SignalCrashThe test is terminated via a signal.4.0
Slow Input-A single invocation of the Fuzz Target succeeds, but takes unusually long to do so.2.0

Java (JVM)

NameTypeDescriptionSeverity
LDAP InjectionCrashUntrusted data is used in an LDAP query.9.0
Remote JNDI LookupCrashUntrusted data is used in a JNDI lookup.9.0
OS Command InjectionCrashUntrusted data is used to execute OS commands.9.0
SQL InjectionCrashInsertion of a SQL query via the input data from the client to the application.8.0
Remote Code ExecutionCrashExecution of arbitrary code on a system.7.0
Load Arbitrary LibraryCrashUntrusted data is used to load dynamic libraries.7.0
TimeoutCrashA fuzzing input takes longer than the specified timeout.7.0
XPath InjectionCrashUntrusted data is used to execute XPath queries.7.0
Server Side Request ForgeryCrashAble to send crafted requests from the system.5.0
Script Engine InjectionCrashExecution of malicious code by an application that uses a script engine.5.0
Deadly SignalCrashThe test is terminated via a signal.4.0
Regular Expression InjectionCrashUntrusted data is used to execute regular expressions.1.0
Possible SQL InjectionWarningIn-progress query has violated SQL syntax rules, possibly resulting in a SQL Injection.7.0
Array Out of BoundsWarningAccessing an array out of its defined bounds using a read or write operation.4.0
Negative Array SizeWarningAttempting to create an array with a negative size.4.0
Dereference of Null ObjectWarningDereferencing a null object reference.4.0
Number Format ExceptionWarningOccurs e.g. when converting a String to a numeric type.4.0
Java ExceptionWarningAn unhandled exception has been triggered by the fuzzer.4.0
Slow Input-A single invocation of the Fuzz Target succeeds, but takes unusually long to do so.2.0

Javascript

NameTypeDescriptionSeverity
Command InjectionCrashUntrusted data is used to execute OS commands.9.0
Prototype PollutionCrashUser-controllable data is able to influence the prototype of an object.9.0
Path TraversalCrashAccess to arbitrary files and directories stored on the system by manipulating variables.5.0