s0l42

Results 8 issues of s0l42

Hello, A endless-loop detected in ok_wav_decode_caf_file by fuzzing. In detail, my testcase's chunk_length is 0x64, and after casting input_user_data to FILE*, it access a wrong memory, and the memory here...

Hello, I found a heap buffer overflow in ok_wav.c: ok_wav_decode_ms_ima_adpcm_data, line 627. In detail, my testcase's input size < 4, but in line 627, the for loop access input[2] and...

Hello, I found a heap buffer overflow in ok_wav.c: ok_wav_decode_ms_ima_adpcm_data, line 613. In detail, my testcase's input size is 2, but in line 613, the code access input[2], so here...

I detected a sql inject in login.jsp by source code review. In detail, the code in teacherD/studentD.checkAccount concat the username and password with sql, and cause a sql inject. ![image](https://github.com/Hui4401/StudentManager/assets/56333292/098fcd35-c649-467a-8371-6c5b52daedee)...

I found a sql inject in one_page_student.findWithId/findWithName. Set a breakpoint as follows: ![image](https://github.com/Hui4401/StudentManager/assets/56333292/e216ac42-c01d-4794-b591-ffc65b091360) When I use payload `one_page_student?key=1' or '1'='1`,it hits the breakpoint. ![image](https://github.com/Hui4401/StudentManager/assets/56333292/2d9d6051-b0ed-4307-b9fb-d6c5077027b1) ![image](https://github.com/Hui4401/StudentManager/assets/56333292/dca4abf3-9d99-4240-b1c0-1246335f385a) After executing `String sql=...`, `sql`...

I found a arbitrary password reset in student/personal.jsp. When a user modify its information, here is not a check about who it is, and calls update_student_security, updates database columns just...

I found a arbitrary password reset in teacher/personal.jsp. When a user modify its information, here is not a check about who it is, and call update_teacher, update database columns just...

Hello, I'm a new learning linux. I've compiled the kernel and file system by script **run_debian_arm64.sh**, but when I exec `./run_debian_arm64.sh run`, here are two **Failed**s in console and I...