ZMap (v4.3.4) – Full Source Code Vulnerability Report

LLM-Powered Static Analysis of One of the World’s Most Widely Used Internet-Scanning Libraries

ZMap is used across countless cybersecurity products, scanners, and research tools.

We scanned the complete ZMap v4.3.4 source code using our in-house LLM-based Source Code Vulnerability Detection Engine — and found several critical issues mapped to real CVEs & CWEs.

This report reveals the results.

Summary of Findings

From the full analysis, our system detected:

  • High Severity: 19 vulnerabilities
  • Medium Severity: 71 vulnerabilities
  • Low Severity: 12 vulnerabilities
  • Unclassified / No Severity Provided: 57 vulnerabilities

What’s Inside the Report?

Full Vulnerability List

  • CVE-mapped vulnerabilities
  • CWE classification
  • File path, function name, and line numbers
  • Severity (High / Medium / Low)
  • Description of each issue

Pattern-Level Insights

  • Memory-safety bugs (CWE-787, CWE-125, CWE-416)
  • Race conditions & improper synchronization
  • Buffer overflow & out-of-bounds access patterns
  • Input validation weaknesses
  • Improper initialization and uninitialized memory use

LLM-Generated Contextual Analysis

  • Why the issue occurs
  • Which execution paths are affected
  • Potential impact on a real-world system

Auto-Generated Remediation Notes (Where Applicable)

  • Suggested code-level corrections
  • Safer alternative patterns
  • Defensive programming strategies

Why We Published This Report

ZMap is widely integrated into security tools — but most teams have never audited its source deeply.

Our LLM-driven system is built to:

  • Detect vulnerabilities across multi-file codebases
  • Map issues to known CVEs & CWEs
  • Provide contextual reasoning, not keyword heuristics
  • Catch vulnerabilities traditional SAST often misses

This public report serves as a real example of what our engine can uncover.

Who Should Download This Report?

  • Security product teams using ZMap or similar network-scanning libraries
  • AppSec leaders evaluating modern SAST tools
  • Researchers and cybersecurity engineers
  • CTOs assessing supply-chain exposure
  • Developers maintaining C/C++ infrastructure code

Sample of Issues Detected (Preview)

Heap Buffer Overflow (CWE-787) – Multiple Occurrences

Example: module_tcp_cisco_backdoor.c → synscan_make_packet()
Mapped CVE: CVE-2020-24266
Severity: Medium

NULL Pointer Dereference (CWE-476)

Example: constraint.c → _lookup_ip()
Mapped CVE: CVE-2017-18216
Severity: Low

Improper Initialization (CWE-665)

Example: module_bacnet.c → bacnet_make_packet()
Mapped CVE: CVE-2023-49062
Severity: High

These are only 3 out of 150+ findings.

To access the full structured report, download it below.

Download the Full Report

Get the Complete ZMap v4.3.4 Vulnerability Report
Enter your email to receive:

  • Full vulnerability table (150+ findings)
  • Severity breakdown
  • CVE/CWE mapping
  • File-level and function-level insights
  • LLM reasoning + remediation notes

Fill the following form to download the report