ZMap (v4.3.4) – Full Source Code Vulnerability Report
LLM-Powered Static Analysis of One of the World’s Most Widely Used Internet-Scanning Libraries
ZMap is used across countless cybersecurity products, scanners, and research tools.
We scanned the complete ZMap v4.3.4 source code using our in-house LLM-based Source Code Vulnerability Detection Engine — and found several critical issues mapped to real CVEs & CWEs.
This report reveals the results.
- Repository: https://github.com/zmap/zmap
- Analyzed Version: v4.3.4
- Report Type: LLM-powered SAST (Static Application Security Testing)
Summary of Findings
From the full analysis, our system detected:
- High Severity: 19 vulnerabilities
- Medium Severity: 71 vulnerabilities
- Low Severity: 12 vulnerabilities
- Unclassified / No Severity Provided: 57 vulnerabilities
What’s Inside the Report?
Full Vulnerability List
- CVE-mapped vulnerabilities
- CWE classification
- File path, function name, and line numbers
- Severity (High / Medium / Low)
- Description of each issue
Pattern-Level Insights
- Memory-safety bugs (CWE-787, CWE-125, CWE-416)
- Race conditions & improper synchronization
- Buffer overflow & out-of-bounds access patterns
- Input validation weaknesses
- Improper initialization and uninitialized memory use
LLM-Generated Contextual Analysis
- Why the issue occurs
- Which execution paths are affected
- Potential impact on a real-world system
Auto-Generated Remediation Notes (Where Applicable)
- Suggested code-level corrections
- Safer alternative patterns
- Defensive programming strategies
Why We Published This Report
ZMap is widely integrated into security tools — but most teams have never audited its source deeply.
Our LLM-driven system is built to:
- Detect vulnerabilities across multi-file codebases
- Map issues to known CVEs & CWEs
- Provide contextual reasoning, not keyword heuristics
- Catch vulnerabilities traditional SAST often misses
This public report serves as a real example of what our engine can uncover.
Who Should Download This Report?
- Security product teams using ZMap or similar network-scanning libraries
- AppSec leaders evaluating modern SAST tools
- Researchers and cybersecurity engineers
- CTOs assessing supply-chain exposure
- Developers maintaining C/C++ infrastructure code
Sample of Issues Detected (Preview)
Heap Buffer Overflow (CWE-787) – Multiple Occurrences
Example: module_tcp_cisco_backdoor.c → synscan_make_packet()
Mapped CVE: CVE-2020-24266
Severity: Medium
NULL Pointer Dereference (CWE-476)
Example: constraint.c → _lookup_ip()
Mapped CVE: CVE-2017-18216
Severity: Low
Improper Initialization (CWE-665)
Example: module_bacnet.c → bacnet_make_packet()
Mapped CVE: CVE-2023-49062
Severity: High
These are only 3 out of 150+ findings.
To access the full structured report, download it below.
Download the Full Report
Get the Complete ZMap v4.3.4 Vulnerability Report
Enter your email to receive:
- Full vulnerability table (150+ findings)
- Severity breakdown
- CVE/CWE mapping
- File-level and function-level insights
- LLM reasoning + remediation notes