From 8e867aaa5697c7b87a3c0fa375aac3695c3a4193 Mon Sep 17 00:00:00 2001 From: John Leitch Date: Sun, 12 Nov 2017 21:06:27 -0800 Subject: [PATCH] Updated readme. --- README.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index ba57752..9bd2295 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,7 @@ BadParser is a vulnerable parser designed to aid in the testing of fuzzers by simulating different kinds of memory corruption issues. Vulnerabilities are simulated by causing write-access violations at specific addresses, which serve as unique identifiers for the different issues. -Currently BadParser only supports JSON input files, but other file formats are planned. +Currently BadParser supports JSON and XML input files, with other file formats planned. The program simulates seven different vulnerabilities: @@ -14,15 +14,15 @@ The program simulates seven different vulnerabilities: **0xdead0003** - widget.position.y integer underflow -**0xdead0004** - widget.buffer buffer underflow +**0xdead0004** - widget.buffer buffer overflow **0xdead0005** - widget.buffer uninitialized pointer -**0xdead0006** - widget array buffer pointer +**0xdead0006** - widget array buffer overflow pointer **0xdead0007** - widget.variant type confusion -Test files for each issue can be found in the application directory e.g. test_0xdeadbeef1.json. +Test files for each issue can be found in the application directory e.g. test_0xdead0001.json or test_0xdead0001.xml. ## Running BadParser