Skip to content

Commit

Permalink
Updated readme.
Browse files Browse the repository at this point in the history
  • Loading branch information
John-Leitch committed Nov 13, 2017
1 parent f63ecf8 commit 8e867aa
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

BadParser is a vulnerable parser designed to aid in the testing of fuzzers by simulating different kinds of memory corruption issues. Vulnerabilities are simulated by causing write-access violations at specific addresses, which serve as unique identifiers for the different issues.

Currently BadParser only supports JSON input files, but other file formats are planned.
Currently BadParser supports JSON and XML input files, with other file formats planned.

The program simulates seven different vulnerabilities:

Expand All @@ -14,15 +14,15 @@ The program simulates seven different vulnerabilities:

**0xdead0003** - widget.position.y integer underflow

**0xdead0004** - widget.buffer buffer underflow
**0xdead0004** - widget.buffer buffer overflow

**0xdead0005** - widget.buffer uninitialized pointer

**0xdead0006** - widget array buffer pointer
**0xdead0006** - widget array buffer overflow pointer

**0xdead0007** - widget.variant type confusion

Test files for each issue can be found in the application directory e.g. test_0xdeadbeef1.json.
Test files for each issue can be found in the application directory e.g. test_0xdead0001.json or test_0xdead0001.xml.

## Running BadParser

Expand Down

0 comments on commit 8e867aa

Please sign in to comment.