diff options
author | Fabian Meumertzheim <meumertzheim@code-intelligence.com> | 2021-02-11 20:52:13 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2021-02-11 19:52:13 +0000 |
commit | 7d65a0375636622f6470a44a0eb9479d0f1b1456 (patch) | |
tree | b1d3997a23c9341df12197aac1443ae3c4df2433 /README.md | |
parent | 080f248e95cb30c97dbd5234ee25a2b1ed32059c (diff) | |
download | jazzer-api-7d65a0375636622f6470a44a0eb9479d0f1b1456.tar.gz |
Invite users to report findings (#6)
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 3 |
1 files changed, 3 insertions, 0 deletions
@@ -119,6 +119,9 @@ Jazzer has so far uncovered the following vulnerabilities and bugs: * [FasterXML/jackson-dataformats-binary](https://github.com/FasterXML/jackson-dataformats-binary) `CBORParser` throws an undeclared exception on dangling arrays ([fixed](https://github.com/FasterXML/jackson-dataformats-binary/issues/240)) * [Apache/commons-imaging](https://commons.apache.org/proper/commons-imaging/) throws undeclared exceptions in parsers for multiple image formats (reported as [`IMAGING-275`](https://issues.apache.org/jira/browse/IMAGING-275) through [`IMAGING-279`](https://issues.apache.org/jira/browse/IMAGING-279)) +If you find bugs with Jazzer, we would be happy to hear from you! +Feel free to [open an issue](https://github.com/CodeIntelligenceTesting/jazzer/issues/new) or submit a pull request. + ## Usage ### Creating a fuzz target |