Skip to content
Snippets Groups Projects

Repository graph

You can move around the graph by using the arrow keys.
Select Git revision
  • f05c65d7aad54ed2f904e6598af324fdffb7fdc2
  • master default protected
  • 2020_gitignore_updates
  • history
  • squashed
  • tourney_patches
6 results
Created with Raphaël 2.2.05Sep30Sep292825171611109765Add .gitignore and .gitlab-ci.yml2020_gitignore_…2020_gitignore_updatesadd an vulnerability that wrong when max length usernameadd an vulnerability that wrong when 1024 different put but it has a bugadd vulnerability that wrong when length of url is 1014Merge branch 'fuzzer' into Yuqiang-VulnerabilitiesDone:add vulnerability:wrong when 1024 times of putDone:Done:Initial releasemastermasterInitial releasesquashedsquashedUpdated NUMFUZZ - eyeballed to 100history tourney…history tourney_patchesMerge branch 'master' into tourney_patchesChanges to work with swen_tourneyRevert "make a simple vulnerable version"Revert "add a poc for a vuln1"update Makefile to build plain versions of binaries tooupdate README to reflect the repo structureadd a poc for a vuln1make a simple vulnerable version a script for building that we can tailor for the tournamentREAMDE now out of daterestructure to more closely fit assignment 1 for tourneysave to /dev/null when fuzzing etc.reduce maximum number of instructions to ensure quick running time when we are given pathaological input that produces unbalanced binary treemove scripts to root dirscript for running their fuzzeradd vuln version stubsmove Makefile; currently broken of courseadd eng unimelb setup script from last yearturn on -g by default in CFLAGSjava stubs for fuzzer; top-level README and pocs stubscomments, error messges etc.don't check master pw when fuzzing etc. but vulns might still reveal itdon't have execute close the file, to avoid double-free bug in linuxsecure password input -- but not storageadd PASSBOOK_FUZZ flag for cov testcase tooadd paster pw checkingnotefix memory leaks
Loading