s0l42
s0l42
Hello, A endless-loop detected in ok_wav_decode_caf_file by fuzzing. In detail, my testcase's chunk_length is 0x64, and after casting input_user_data to FILE*, it access a wrong memory, and the memory here...
Hello, I found a heap buffer overflow in ok_wav.c: ok_wav_decode_ms_ima_adpcm_data, line 627. In detail, my testcase's input size < 4, but in line 627, the for loop access input[2] and...
Hello, I found a heap buffer overflow in ok_wav.c: ok_wav_decode_ms_ima_adpcm_data, line 613. In detail, my testcase's input size is 2, but in line 613, the code access input[2], so here...
I detected a sql inject in login.jsp by source code review. In detail, the code in teacherD/studentD.checkAccount concat the username and password with sql, and cause a sql inject. ...
I found a sql inject in one_page_student.findWithId/findWithName. Set a breakpoint as follows:  When I use payload `one_page_student?key=1' or '1'='1`,it hits the breakpoint.   After executing `String sql=...`, `sql`...
I found a arbitrary password reset in student/personal.jsp. When a user modify its information, here is not a check about who it is, and calls update_student_security, updates database columns just...
I found a arbitrary password reset in teacher/personal.jsp. When a user modify its information, here is not a check about who it is, and call update_teacher, update database columns just...
Hello, I'm a new learning linux. I've compiled the kernel and file system by script **run_debian_arm64.sh**, but when I exec `./run_debian_arm64.sh run`, here are two **Failed**s in console and I...